DC ElementWertSprache
dc.contributor.authorZieger, Andrej
dc.contributor.authorFreiling, Felix
dc.contributor.authorKossakowski, Klaus-Peter
dc.date.accessioned2020-08-26T09:15:12Z-
dc.date.available2020-08-26T09:15:12Z-
dc.date.issued2018-5-7
dc.identifier.urihttp://hdl.handle.net/20.500.12738/943-
dc.description.abstractTo manage cyber security risks in practice, a simple yet effective method to assess such risks for individual systems is needed. With time-to-compromise (TTC), McQueen et al. (2005) introduced such a metric that measures the expected time that a system remains uncompromised given a specific threat landscape. TTC combines simplicity with expressiveness and therefore has evolved into one of the most successful cybersecurity metrics in practice. We revisit TTC and identify several mathematical and methodological shortcomings which we address by embedding all aspects of the metric into the continuous domain and the possibility to incorporate information about vulnerability characteristics and other cyber threat intelligence into the model. We propose ?-TTC, a formal extension of TTC which includes information from CVSS vectors as well as a continuous attacker skill based on a ?-distribution. We show that our new metric remains simple enough for practical use and gives more realistic predictions than the original TTC by using data from a modern and productively used vulnerability database of a national CERT.
dc.language.isoen
dc.publisherIEEE
dc.titleThe ?-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation
dc.typeinProceedings
dc.relation.conferenceInternational Conference on IT Security Incident Management & IT Forensics (IMF) ; -Mai ; Hamburg, Germany
tuhh.container.endpage133
tuhh.container.startpage115
tuhh.oai.showtrueen_US
tuhh.publication.instituteDepartment Informatik
tuhh.publication.instituteFakultät Technik und Informatik
tuhh.publisher.doi10.1109/IMF.2018.00006
tuhh.publisher.urlhttps://ieeexplore.ieee.org/document/8514838
tuhh.type.opusInProceedings (Aufsatz / Paper einer Konferenz etc.)-
dc.type.casraiConference Paper-
dc.type.dinicontributionToPeriodical-
dc.type.drivercontributionToPeriodical-
dcterms.DCMITypeText-
item.creatorGNDZieger, Andrej-
item.creatorGNDFreiling, Felix-
item.creatorGNDKossakowski, Klaus-Peter-
item.fulltextNo Fulltext-
item.creatorOrcidZieger, Andrej-
item.creatorOrcidFreiling, Felix-
item.creatorOrcidKossakowski, Klaus-Peter-
item.grantfulltextnone-
item.cerifentitytypePublications-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_5794-
item.openairetypeinProceedings-
crisitem.author.deptDepartment Informatik-
crisitem.author.orcid0009-0005-9852-7947-
crisitem.author.parentorgFakultät Technik und Informatik-
Enthalten in den Sammlungen:Publications without full text
Zur Kurzanzeige

Seitenansichten

47
checked on 27.12.2024

Google ScholarTM

Prüfe

HAW Katalog

Prüfe

Volltext ergänzen

Feedback zu diesem Datensatz


Alle Ressourcen in diesem Repository sind urheberrechtlich geschützt.