=Paper= {{Paper |id=Vol-1788/STIDS2016_A01 |storemode=property |title=A Holistic Approach to Evaluate Cyber Threat |pdfUrl=https://ceur-ws.org/Vol-1788/STIDS_2016_A01_Monteiro_etal.pdf |volume=Vol-1788 |authors=Márcio Monteiro,Thalysson Sarmento,Alexandre Barreto,Paulo C. G. Costa |dblpUrl=https://dblp.org/rec/conf/stids/MonteiroSBC16 }} ==A Holistic Approach to Evaluate Cyber Threat== https://ceur-ws.org/Vol-1788/STIDS_2016_A01_Monteiro_etal.pdf
       A Holistic Approach to Evaluate Cyber Threat
                   Márcio Monteiro1 , Thalysson Sarmento1 , Alexandre Barreto1 and Paulo Costa2
                       1 Instituto de Controle do Espaço Aéreo, São José dos Campos, Brazil
                                 2 C4I Center, George Mason University, Fairfax, USA

                 E-mails: {contemmcm, thalyssontfs, barretoabb}@icea.gov.br, pcosta@c4i.gmu.edu


   Abstract—Several vulnerability databases and standards are
currently available for assessing the degree of security of IT
infrastructures in general. These standards focus on different
aspects of the systems, while generally failing to provide support
for holistic analyses - a key aspect in ensuring a secure IT
infrastructure. This work aims to address this gap by presenting
a new methodology for evaluating the overall security risks of
a networked system that adopts an ontology-based approach we
presented in previous work. We leverage current security stan-
dards and databases, while also considering the human factors
to build a broader and interconnected view. Our methodology is
meant to achieve a more realistic picture of the network security,
hence improving situation awareness for its administrators. To
illustrate our approach, this paper brings a case study applying
the new methodology to a few target networks. The proof of
concept is meant to underscore the methodology’s effectiveness
in assessing the security of the whole network.
                     I. INTRODUCTION
   Cyber security assessment has a importance role in a mod-
ern society. has become more interconnected through computer
systems and networks. It is well-established that cyber threats
can cause on corporations severe economic losses and damages
to their reputation [1]. As a result, investments on cyber
security has been growing significantly, even during market
crises [2].
   A basic standard for cyber security assessment is the Com-
mon Vulnerabilities and Exposures (CVE), which is the de
facto standard to report and communicate software vulnerabili-
ties between organizations and entities. Currently, the CVE has
been standardized by the Telecommunication Standardization
Sector of the International Telecommunication Union (ITU-                         Fig. 1: How secure is this network?
T) [3] and is being heavily used by automatic security assess-
ment tools (e.g., Nessus and OpenVAS) to identify software
vulnerabilities on target hosts.
                                                                     impact the overall score of the system. In addition, users can
   On top of CVE, another standard was established to score
                                                                     also be considered vulnerabilities of the system, as they could
the vulnerabilities with respect to their severity, impact and
                                                                     be deceived (or “exploited”) somehow to execute malicious
exploitation capacity. This standard is called Common Vul-
                                                                     software. Then, security unaware or careless users should also
nerability Scoring System (CVSS). One of the most important
                                                                     impact the overall score of the system.
CVSS databases is hosted and managed by the National
Vulnerability Database (NVD), which provides the scores for             In this work we propose to analyze those aspects (CVE,
most known vulnerabilities.                                          CVSS and human factors) in a unified manner for a target
   Although those standards are very efficient in cataloging and     network, where vulnerabilities scores are propagated through
prioritizing software vulnerabilities, system administrators are     the network’s trusted relationships (intentional or not). This
usually interested in knowing how vulnerable is their entire         way, we provide an overall security metric that can be used
network, no only individual hosts.                                   to classify entire networks.
   For instance, if a web server is highly protected against            This work is organized as follows: Sec. II briefly details
external threats, but vulnerable hosts in the same local area        the main attributes of CVE and CVSS; Sec. III presents the
network have open access to the server, this condition should        proposed metric; and Sec. IV concludes with final remarks.




                                                 STIDS 2016 Proceedings Page 64
                        II. OVERVIEW                                  Usually, the CVSS is represented as a vector string, a
A. Common Vulnerabilities and Exposures                            compressed textual representation of the values used to derive
                                                                   the score. String (1) below is an example of a CVSS vector
   The Common Vulnerabilities and Exposures (CVE) is a
                                                                   string.
standard for cataloging vulnerabilities of computer systems.
It consists of a list of information of security vulnerabilities       CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:H             (1)
and exposures, mainly reported by the community, aiming
to provide common names for publicly known problems. It              The equations adopted to calculate the CVSS base score are
allows to share data about vulnerability capabilities (tools,      provided in Sec. III.
repositories, and services).                                       C. Human Factors
   The main attributes of a CVE are:
                                                                      Human factors play an important role in the security of
   • CVE identifier number (i.e., CVE-1999-0067);
                                                                   an organization, since users are used as both targets and
   • Vulnerability type: buffer overflow, cross site request
                                                                   vectors of attacks. Several social engineering methods can
      forgery (CSRF), cross site scripting (XSS), directory        be employed to obtain key information and select the most
      traversal, incorrect access control, insecure permissions,   vulnerable employees.
      integer overflow, missing SSL certificate validation, SQL       In this work we propose to model the users’ “vulnerabili-
      injection, XML external entity (XXE), and others or          ties” as a CVSS-like metric. In other words, the users would
      unknown;                                                     also be rated by the impact and exploitability subscores. As
   • Vendor of the product(s);
                                                                   an example, users with high privileges in the network would
   • List of vulnerable products and versions;
                                                                   have a high impact factor, because if they get “compromised”
   • Attack type: context-dependent, local, physical, remote,
                                                                   that would grant intruders deeper access to the network.
      other;                                                          On the other hand, users unaware of security issues or
   • Impact: code execution, denial of service, escalation of
                                                                   careless about it can be considered highly “exploitable”, that
      privileges, information disclosure, other.                   is, they can be easily deceived to execute malicious software
   Currently, the MITRE Corporation is responsible for man-        on their computers. There are numerous methods to do so,
aging CVE identifiers generation and publication through its       such as telephone calls from fake IT staff, phishing campaigns,
web site [4]. In addition, MITRE also delegates this attribution   malicious websites, etc.
to its several CVE numbering authorities (CNAs).                      To prevent such situations, the staff should perform security
                                                                   awareness training. Besides, the corporation should have a
B. Common Vulnerability Scoring System
                                                                   solid information security policy and all means should be
   The Common Vulnerability Scoring System (CVSS) is               employed to enforce it.
an open framework for describing specific characteristics of
software vulnerabilities. It consists of three metric groups:                      III. T HE P ROPOSED M ETRIC
base, temporal, and environmental.                                    System administrators usually focus heavily in protecting
   The base group represents the intrinsic qualities of a vul-     their networks against external cyber attacks. For this reason,
nerability, the temporal group reflects the characteristics of a   the insider threats might receive insufficient attention and,
vulnerability that changes over time, and the environmental        consequently, the security can be impacted. Considering that
group represents characteristics of a vulnerability that are       every host connected to the Internet is a potential attack vector
unique to the user’s environment.                                  through phishing campaigns (someone trying to convince the
   In this work, we focus on the base metric, which produces       user to execute the malicious code) and applications vulnera-
a score ranging from 0.0 to 10.0. It is composed by the impact     bilities (browsers, e-mail and document readers), and that the
subscore (ranging from 0 to 6) and the exploitability subscore     protection against known hosts is reduced, then a single host
(ranging from 0 to 4). However, the overall CVSS score of          can severely compromise the security of the entire network.
a single vulnerability is also impacted by the temporal and           The proposed metric in this work is obtained by a five-
environmental metrics. Readers are encouraged to refer to [5]      step approach, each one being required for computing the
for more information on CVSS specifications and formulas.          overall security of a given network. The technique involves
   The main attributes of CVSS base score are:                     building a graph representing the overall network as well as
   • Attack vector (AV): network (N), adjacent network (A),        the relationship between each step. The relative importance
      local (L), and physical (P);                                 of each step is assessed using multi-criteria decision analysis
   • Attack complexity (AC): low (L), high (H);                    concepts.
   • Privileges required (PR): none (N), low (L), high (H);           There are different approaches for building such graph
   • User interaction (UI): none (N), required (R);                and defining the metric. However, the specific aspects of the
   • Scope (S): unchanged (U), changed (C);                        cyber security domain involving different perspectives (e.g.
   • Confidentiality impact (C): none (N), Low (L), high (H);      technical, human factor, standards, etc.) naturally led us to
   • Integrity impact (I): none (N), Low (L), high (H);            reuse/adopt the ontology-based approach previously presented
   • Availability impact (A): none (N), Low (L), high (H);         in [6]. The general idea is to use semantic techniques in




                                               STIDS 2016 Proceedings Page 65
                                                     Fig. 2: Mission Ontology


supporting the definition of the target mission, its support task,   cation destination, and a cell filled with a ‘Y’ informs that such
as well as the services and network configuration required           communication is allowed (or that there is nothing forbidding
to accomplish a mission. As in the aforementioned previous           such communication).
version, in this work we use the DoDAF Conceptual Data
                                                                       TABLE I: Trusted relationships between assets (matrix).
Model to represent the concepts involved in the mission.
The difference, however, is that in this work we extend this                       1    2   3    4    5   6    7   8    9   10
approach by incorporating time and event descriptions [7].                    1    -                           Y
                                                                              2    Y    -   Y    Y   Y    Y    Y
   The ontology is presented in Figure 2, which conveys the                   3         Y   -    Y   Y    Y
queries that can be performed in cyber-situation awareness:                   4                  -   Y    Y    Y
WHAT (Activity), WHY (Goal and Desire Effect), HOW                            5                  Y   -    Y    Y
                                                                              6    Y    Y   Y    Y   Y    -    Y
(Resource and Guidance), WHO (Performer), WHERE (Lo-                          7    Y                           -
cation), and WHEN (Timestamp and Event).                                      8                  Y                  -
   1) Complete inventory: The first step consists in obtaining                9                      Y                  -
                                                                             10    Y                      Y                  -
a complete and detailed asset inventory record of the target
network, including hubs, switches, routers, software list, etc.         To generate the aforementioned table, a SPARQL query is
This is fundamental for every security approach and should           performed on the Mission Ontology. This greatly simplifies
not be a problem for security aware corporations.                    the otherwise complex task of discovering and mapping con-
   2) Communications: The second step consists in mapping            nections, in spite of these being hidden or not.
the communication between the assets (including the users).             An alternative representation of Table I can be achieved
If the network contains N assets, this can be mapped into a          through directed graphs, as depicted in Fig. 3. The main
N ⇥ N matrix.                                                        advantage of this approach is that it makes relatively easier
   Taking Fig. 1 as example, we can derive its access matrix as      to identify nodes with a higher impact higher to the overall
presented in Table I, where the rows represent the asset with        security of the network. Also, it becomes possible to derive
communication initiative, the columns represent the communi-         attack chains throughout the network.




                                                 STIDS 2016 Proceedings Page 66
                                                                            On the sequence, the attack complexity (AC) parameter is
                                                                         given by (7)
                                                                                             (
                                                                                               0.77, if AC = Low (L),
                                                                                       AC =                                      (7)
                                                                                               0.44, if AC = High (H).
                                                                            For unmodified scope (S:U), the following equation applies
                                                                         for the privileges required (PR) parameter:
                                                                                              8
                                                                                              <0.85, if PR = None (N),
                                                                                              >
                                                                                         PR =   0.62, if PR = Low (L),             (8)
                                                                                              >
                                                                                              :
                                                                                                0.27, if PR = High (H).
                                                                           However, for modified scope (S:C), the following equation
                                                                         applies for PR:
                                                                                            8
                                                                                            <0.85, if PR = None (N),
                                                                                            >
                                                                                       PR =   0.68, if PR = Low (L),             (9)
                                                                                            >
                                                                                            :
                                                                                              0.50, if PR = High (H).
    Fig. 3: Trusted relationships between assets (graph).
                                                                           Finally, the user interaction (UI) parameter can be given by
                                                                         (10):
   3) Vulnerabilities assessment: The third step is to obtain                             (
the CVE IDs and CVSS base vector string for all N hosts of                                  0.85, if UI = Not Required (N),
                                                                                     UI =                                          (10)
the network. There are many automated tools that can help in                                0.62, if UI = Required (R).
obtaining this information, such as the Nessus Vulnerability
Scanner [8] and the Open Vulnerability Assessment System                    5) Computing the proposed metric: After computing the
(OpenVAS) [9].                                                           impact sub score (↵) and exploitability sub score ( ), for every
   4) Calculating Scores: Once the vulnerabilities are ob-               vulnerability found in previous steps we need to assemble a
tained, for every CVSS string we need to compute the impact              P matrix, where the first column (pi,1 , 8i) corresponds to
sub score ↵ and the exploitability sub score .                           the impact sub score (↵), and the second column (pj,2 , 8j)
   The impact sub score ↵ can be computed according to (2):              corresponds to the exploitability sub score ( ). Then, we need
             8                                                           to append three additional points to this matrix such that its
             >
             <6.42 ⇥ ISCBase ,              if S = U,                    final version is according to (11):
        ↵ = 7.52 ⇥ [ISCBase 0.029]                        (2)
             >
             :                        15                                         2                                                      3
               3.25 ⇥ [ISCBase 0.02] , if S = C                                             p1,1                      p1,2
where                                                                          6             ..                        ..               7
                                                                               6              .                         .               7
                                                                               6                                                        7
                                                                               6      pN,1                        pN,2                  7
                                                                            P =6                                                        7   (11)
   ISCBase = 1    [(1     C ) ⇥ (1     I ) ⇥ (1           A )] .   (3)         6         0                           0                  7
                                                                               6                                                        7
                                                                               4max(p1,1 , . . . , pN,1 )            0                  5
  The confidentiality impact (C), integrity impact (I) and
                                                                                         0                  max(p1,2 , . . . , pN,2 )
availability impact (A) parameters are given by:
                      8                                                  where the function max(· ) returns the maximum value of its
                      <0.56, if C/I/A = Low (L),
                      >                                                  arguments and N denotes the number of vulnerabilities found
              C/I/A =   0.22, if C/I/A = High (H),      (4)              on previous steps.
                      >
                      :
                        0,    if C/I/A = None (N).                          Finally, we must compute the convex hull of the matrix
                                                                         P and its 2D area (considering the outmost vulnerabilities
  The exploitability sub score can be computed as:
                                                                         as vertices of the polygon), and divide resulting area by the
                                                                         highest possible CVSS subscores (6 ⇥ 4 = 24). Conducting
             = 8.22 ⇥    AV ⇥   AC ⇥    PR ⇥       UI .            (5)
                                                                         the calculations this way ensures that the proposed metric is
  The attack vector (AV) parameter is given by (6):                      presented as percentage. The results are then used to rate the
             8                                                           network security according the intervals presented on Table II.
             >
             > 0.85, if AV = Network (N),
             >
             <0.62, if AV = Adjacent Network (A),                           Fig. 4 depicts an example of a fictitious network composed
                                                                   (6)   of three nodes. The overall vulnerability metrics has been ap-
       AV =
             >
             >
             > 0.55, if AV = Local (L),                                  pointed as 70.4476 %, which corresponds to the rating Highly
             :                                                           Vulnerable, according to Table II. Every marker on this figure
               0.20, if AV = Physical (P).



                                                  STIDS 2016 Proceedings Page 67
                                         TABLE II: Ratings                                  multiple-criteria analysis and modeling the human factor as
                                      Min (%)    Max (%)      Rating                        CVSS v3 base scores. An example on a fictitious network was
                                      00.00      00.00        None                          performed in order to demonstrate the practicality of the pro-
                                      00.01      39.99        Low                           posed metric. Further, the reuse of concepts previously defined
                                      40.00      69.99        Medium
                                      70.00      89.99        High                          in an existing ontology we had developed suggests that the
                                      90.00      100.0        Critical                      approach can be generalized to encompass the diverse aspects
                                                                                            that permeate the way different corporations are structured.

                     4
                                         Net. Vulnerability: 70.4476%
                                                                                                                   ACKNOWLEDGMENT
                                                                                               Márcio Monteiro, Thalysson Sarmento and Alexandre Bar-
                    3.5
                                                                                            reto would like to thank the financial support of the Brazilian
                     3                                                                      agencies MCTI and FINEP (Ref. 04/2013/12).

                    2.5                                                                                                    R EFERENCES
   Exploitability




                                                                                            [1] CNN Money, “Cybercrime costs the average U.S. firm $15
                     2                                                                          million a year,” 2015, [accessed 05-Sept-2016]. [Online]. Available:
                                                                                                http://money.cnn.com/2015/10/08/technology/cybercrime-cost-business/
                    1.5                                                                     [2] Reuters, “Cyber security investing grows, resilient to market
                                                                              Host 1
                                                                              Host 2
                                                                                                turmoil,” 2015, [accessed 05-Sept-2016]. [Online]. Available:
                     1                                                        Host 3            http://fortune.com/2015/09/23/cyber-security-investing/
                                                                              Metric        [3] Study Group 17, ITU-T Recommendation X.1520: Common vulnerabili-
                    0.5                                                                         ties and exposures, Std., April 2011.
                                                                                            [4] MITRE, “Common vulnerabilities and exposures – the standard for
                     0                                                                          information security vulnerability names,” [accessed 05-Sept-2016].
                          0       1         2         3         4         5             6       [Online]. Available: https://cve.mitre.org/
                                                   Impact                                   [5] FIRST, “Common vulnerability scoring system v3.0: Specification
                                                                                                document – version 1.7,” [accessed 05-Sept-2016]. [Online]. Available:
Fig. 4: Vulnerability assessment using the proposed metric for                                  https://www.first.org/cvss/specification-document
a highly insecure network.                                                                  [6] A. Bareto, “Cyber-argus framework – measuring cyber-impact on the
                                                                                                mission,” Ph.D. dissertation, Instituto Tecnológico de Aeronáutica, Brazil,
                                                                                                7 2013.
                                                                                            [7] W. R. e. a. VAN HAGE, “Design and use of the simple event model
corresponds to a CVSS metrics (impact and exploitability sub                                    (sem),” Web Semantics: Science, Services and Agents on the World Wide
scores).                                                                                        Web, vol. 9, no. 2, Sep 2011.
                                                                                            [8] Tenable Network Security.
  Likewise, Fig. 5 presents a second network with less se-                                  [9] “Open vulnerability assessment system (OpenVAS),” [accessed 05-Sept-
vere individuals vulnerabilities throughout the nodes of the                                    2016]. [Online]. Available: http://www.openvas.org
network. Notice that the overall vulnerability was 16.7402 %,
which corresponds to the rating Low, according to Table II.

                                         Net. Vulnerability: 16.7402%
                     4
                                                                               Host 1
                    3.5                                                        Host 2
                                                                               Host 3
                                                                               Metric
                     3


                    2.5
   Exploitability




                     2


                    1.5


                     1


                    0.5


                     0
                          0       1         2         3         4         5             6
                                                   Impact

                          Fig. 5: Vulnerabilities of hosts of the network.

                                        IV. F INAL R EMARKS
   This work presented an ontology-based approach for ana-
lyzing the vulnerability of a network in a holistic way, using




                                                                         STIDS 2016 Proceedings Page 68