This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities
January/February 2009 (vol. 7 no. 1)
pp. 42-48
Michel Cukier, University of Maryland
Susmit Panjwani, University of Maryland
This article attempts to empirically analyze which vulnerabilities attackers tend to target in order to prioritize vulnerability remediation. This analysis focuses on the link between malicious connections and vulnerabilities, where each connection is considered malicious. Attacks requiring multiple connections are counted as multiple attacks. As the number of connections increases, so does the cost of recovering from the intrusion. The authors deployed four honey pots for four months, each running a different Windows service pack with its associated set of vulnerabilities. They then performed three empirical analyses to determine the relationship between the number of malicious connections and the total number of vulnerabilities, the number of malicious connections and the number of the vulnerabilities for different services, and the number of known successful attacks and the number of vulnerabilities for different services.

1. A. Ozment and S.E. Schechter, "Milk or Wine: Does Software Security Improve with Age?" Proc. 15th Usenix Security Symp., 2006, pp. 93–104.
2. "Creating a Patch and Vulnerability Management Program," Special Publication 800-40, US Nat'l Inst. of Science and Technology (NIST), 2005.
3. S. Panjwani et al., "An Experimental Evaluation to Determine if Port Scans Are Precursors to an Attack," Proc. Int'l. Conf. Dependable Systems and Networks (DSN 05), IEEE CS Press, 2005, pp. 602–611.
4. M. Kendall and J.D. Gibbons, Rank Correlation Methods, Edward Arnold, 1990.
5. J.P. Guilford, Fundamental Statistics in Psychology and Education, McGraw-Hill, 1965.

Index Terms:
attacks, vulnerabilities, honeypots, empirical data
Citation:
Michel Cukier, Susmit Panjwani, "Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities," IEEE Security & Privacy, vol. 7, no. 1, pp. 42-48, Jan.-Feb. 2009, doi:10.1109/MSP.2009.13
Usage of this product signifies your acceptance of the Terms of Use.