Non-Homogeneous Stochastic Model For
Non-Homogeneous Stochastic Model For
http://www.scirp.org/journal/jis
ISSN Online: 2153-1242
ISSN Print: 2153-1234
Keywords
Vulnerability, Attack Graph, Markov Model, Security Evaluation,
Expected Path Length (EPL), Common Vulnerability Scoring System (CVSS),
Non Homogeneous Stochastic Model
1. Introduction
In 2016, the U.S. Government Cybersecurity report commences with the fol-
lowing paragraph. [4] “In July 2015, hackers stole social security numbers, health
data, and other highly sensitive data from 21 million Americans through the Of-
fice of Personnel Management in what, at the time, was the largest data breach in
U.S. history. As a response, U.S. government agencies committed to making sig-
nificant efforts to reinforce and expand existing security measures. Security Sco-
recard wanted to find out if these government agencies were successful in their
commitment”. “Symantec corporation”, in their “Internet security threat report
2016-Volume 21” [5] presents with records on rapidly increasing vulnerabili-
ties, security threats, susceptibility of systems that motivates researchers to
study these important issues on Cybersecurity measures. Cybersecurity is one of
the critical issues that our global society is facing on daily basis. It is now a part
of our daily life and culture and has become an index of personal security and
integrity.
To address this scenario, many research efforts have been taken. However,
due to the peculiar, voluminous and dynamic nature of the field, defending me-
thods are still chasing behind the defending targets. Therefore, it is extremely
important to integrate scientific efforts and develop strong theoretical basis
aiming for rapid development of applications and system solutions.
In this study, we continue our research efforts in integrating Mathematical
and Statistical theories into better understanding the complex behavior of com-
puter network systems in the perspective of Cybersecurity. Thus, we propose a
new method to estimate the EPL as a function of time “t”. The EPL is a major
factor in determining the risk level of a given computer system where with
smaller EPL, the network system is more vulnerable and probable to be ex-
ploited.
In our recent studies, [1] [2] [3], we introduced several stochastic models to
better understand the behavior of vulnerabilities, network systems with respect
to cybersecurity. Initially, we introduced a stochastic model that can estimate the
Expected Path Length of a system with any three vulnerabilities and two ma-
chines. Then, we introduced a new approach of estimating the probability of a
given vulnerability being exploited at a time t, using Markovian approach with
respect to the Vulnerability life cycle. We have further introduced a set of three
stochastic time dependent models for each categories of vulnerabilities with
Low, Medium and High exploitability scores [6] that can estimate the probabil-
ity of a given vulnerability getting exploited without going through the Marko-
vian process [1] [2] [7] each time. Additionally, the concept of “Risk Factor” [2]
[3] that we introduced and its analytical formulation allowed us to present a
more sophisticated way of estimating the risk associated with a specific vulnera-
bility of a computer network system.
In the present study, we introduce a Non Homogeneous Stochastic Model
that allows the computer system administrators to predict the time that the sys-
tem is most vulnerable for an attack in terms of the EPL. This estimate is based
on the assumption that a system is more susceptible to be exploited when the
EPL is at a minimum at a particular time “t”. In developing this model we have
used a network system of two IPs with three vulnerabilities as a base model.
With the introduction of this new approach we will be re-defending the capa-
bility to estimate the probability of getting exploited as a function of time for a
computer network system with given set of vulnerabilities. Even though we have
already developed a successful statistical model to find the EPL of a possible at-
tack, it is more important to estimate the EPL as a function of time. Current
study will address this need. Thus, for a system with a given set of vulnerabilities,
estimating of most probable exploit times can be modelled on the logical as-
sumption that a system is more susceptible to be exploited at a time where the
Expected Path Length (number of steps that an attacker needs to pass before
achieving the goal state) is at its minimum.
2. Methodology
2.1. Cybersecurity Analysis Method
The core component of this method is the attack graph [1] [7]. An attack graph
for a cybersecurity system has several nodes, which represent both the vulnera-
bilities that exist in the system and the attacker’s states [1] [7]. We consider that
it is possible to go to a goal state starting from any other state in the attack
graph. This possibility depends on several factors such as the attacker’s attack-
ing strategy, recourses, system design, networking, authenticating protocols,
human interface and other environmental factors. An attack graph has at least
one “Absorbing state” named “Goal state”, which is, the state where the at-
tacker will reach his objective and cannot go beyond. Therefore we will model
the attack graph as an absorbing Markov chain [1] [2] [3].
Absorbing state or goal state is the security node which the attacker expects to
reach and exploit. When the attacker has reached this goal state, the attack path
is completed. Thus, the entire attack graph consists of these types of attack paths
that will be illustrated in this study.
Given the CVSS score [8] [9] for each vulnerability in the attack Graph, we
can estimate the transition probabilities of the absorbing Markov chain by nor-
malizing the CVSS scores over all the edges starting from the attacker’s source
state (initial state). The analytical methodology that we used is explained below.
We define,
j = probability that an attacker is currently in state i and exploits a vulnerabil-
ity in state.
n = number of outgoing edges from state i in the attack model.
vj = CVSS score of the vulnerability in state j.
Thus formally we can define the transition probability given by,
vj
pij =
∑ k =1 vk
n
Now, using these transition probabilities we can derive the absorbing transi-
tion probability matrix P, which possesses the properties defined under Markov
Table 1. Model equations of risk factors for three different categories of vulnerabilities.
is the analytic form of the risk factor as a function of Y(t) and e(vj) where Y(t) is
the exploitability probability factor as a function of time and e(vj) is the exploi-
tability score taken from the CVSS.
Once the stationarity is achieved, goal state column of this matrix Π has ones,
so we can find the minimum number of steps (time) that the attacker will reach
the goal state with probability 1. Once the attacker is in the goal state we can
identify the probability of the system being exploited.
This property implies that all the eigenvalues of Q have absolute values strictly
less than 1. Thus, I − Q is an invertible matrix and there is no problem in de-
fining the matrix
M =( I − Q ) = I + Q + Q 2 + Q 3 +
−1
Time for
Published CVSS Exploitability Risk factor
Vulnerability the date
date score score R(νj(tj))
6/24/2016 (tj)
V1 9
6/15/2016 8 9 1.702
(CVE 2016-3230) (High)
V2 4.3
6/13/2016 2.8 11 0.3667
(CVE 2016-2832) (medium)
V3 1.9
6/19/2016 3.4 5 0.2474
(CVE 2016-0911) (Low)
Attacker
Router
and the relevant details are available in the CVE detail and other relevant official
websites.
June 24th was used as the date where a first attack attempt was made by an at-
tacker. Risk factor is hence the Risk of being exploited on the 24th of June, cal-
culated using the equation presented in the Section 2.2. That is,
( v (=
j t )) Y (t ) ∗ e (v ) j
For example, let’s consider the vulnerability “V1 (CVE 2016-3230)”. The
CVSS score has given the exploitability score for this vulnerability as 8. Taking
the difference between the published date (June 15th) and the attack date (June
24th), the age of this vulnerability is calculated as 9 days. Since this is a vulnera-
bility of the category “High”, we can now use our model given in the Table 1
and calculate the “Risk Factor” as follows.
1
R ( v1 ( t ) ) =
0.191701 − 0.383521 t − 0.00358ln ( ln t ) ∗ 8
R ( v1 ( 9 ) ) = 1.702
Similarly, Risk factors for two other vulnerabilities are also calculated and
presented in the Table 2 below.
Let s1, s2, s3, s4, represent the attack states for Attacker, (IP1.1), (IP2.1) and
(IP2.2), respectively.
To find the weighted value of exploiting each vulnerability from one state to
another state, we divide the vulnerability score by summation of all out going
vulnerability values from that state.
For our attack graph the weighted value of exploiting each vulnerability is
given below. 1st row probabilities:
Weighted value of exploiting V1 from s1 to s2 is R1/(R1 + R2) Weighted value of
exploiting V2 from s1 to s3 is R2/(R1 + R2) 2nd row probabilities:
Weighted value of exploiting V2 from s2 to s3 is R2/(R2) 3rd row probabilities:
Weighted value of exploiting V1 from s3 to s2 is R1/(R1 + R3) Weighted value of
exploiting V3 from s3 to s4 is R3/(R1 + R3) 4th row probabilities:
Weighted value of exploiting V3 from s4 to s4 is 1.
For the Host Centric Attack graph we can have the Adjacency Matrix as fol-
lows.
Applying the information given in Table 1, the matrix A can be obtained as
follows.
s1 s2 s3 s4
s1 0 0.7614 0.2386 0
s 0 0 1 0
A= 2
s3 0 0.8255 0 0.1745
s4 0 0 0 1
each vulnerability by taking the difference between the published date and the
24th of June. And, substitute this value of “t” in relevant model equation given in
the Table 1.
Step 2: Using those “Risk Factors”, develop the transition matrix “A” and
calculate the EPL.
Step 3: Repeat the same process for all the following dates that we need to
calculate the
Expected Path Length.
From Table 3 below, we can identify that the number of days a hacker will
take to reach his goal of exploitability for the given computer network system we
have structured.
For example, let’s consider the 20th day. Under step 1, we calculate the Risk
factors for V1, V2 and V3. For the 20th day age of three vulnerabilities V1, V2 and
V3 are, t1 = 9 + 20, t2 = 11 + 20 and t3 = 5 + 20, respectively. Then, by substituting
these ages in the respective model equation from the Table 1 and multiplying
the answers by respective exploitability score, we calculate three risk factors as
follows.
V1 is a vulnerability of “High” category. Therefore, we use the 3rd model equ-
ation from Table 1 and obtain the Risk factor as follows.
Substituting, t = 29, in the model,
( v1 (=
t )) Y ( t ) ∗ e ( v1 )
we obtain,
=R1 0.191701 − 0.383521 × (1 29 ) − 0.00358ln ( ln 29
= ) × 8 1.393
Similarly for V2 and V3 we obtain the following Risk factors calculated using
the relevant model equations.
For, t = 31,
( v2 (=
t )) Y ( t ) ∗ e ( v2 )
Table 3. Expected path length relative to number of days after first attack.
4. Conclusions
In the present study, we have developed a nonhomogeneous stochastic model
for predicting the Expected Path Length (EPL) of a computer network system
with a given set of vulnerabilities at time “t”.
Knowing EPL as a function of time is extremely important in developing de-
fending strategies for not being exploited. Such strategies will reduce the like-
lihood of the computer network system being hacked.
As we observe the behavior of the EPL over the time, it is possible to identify
the time ranges where EPL reached a minimum. Small EPL implies higher
chance for a hacker to be successful. In other words, a computer network system
is more vulnerable to be exploited on the days where the EPL is the smallest. On
such time “t”, vulnerabilities and the system are hence more susceptible to be
hacked. The same scenario from an attacker’s point of view can be explained.
That is, on the days where EPL is at its smallest, the likelihood of making a suc-
cessful attack attempt is higher. Therefore, an attacker (hacker), who identifies
the set of vulnerabilities in a given computer system would put more attempt on
exploiting the system on such date where the EPL is at its smallest. This means
that we can use this method as a prediction method of attacking (hacking) time.
By knowing this time for any computer network system, security engineers or
IT architects can take the necessary actions in advance to protect their computer
system.
Finally, we have developed our methodology based on a typical computer
network system that exists in a real world situation with given vulnerabilities
that identifies the EPL and actual time that the subject computer system could
be exploited. Thus, industry can apply the developed methodology in their own
computer network system with a given (known) vulnerabilities to predict the
EPL and most probable time of being exploited.
References
[1] Kaluarachchi, P.K., Tsokos, C.P. and Rajasooriya, S.M. (2016) Cybersecurity: A Sta-
tistical Predictive Model for the Expected Path Length. Journal of information Se-
curity, 7, 112-128. https://doi.org/10.4236/jis.2016.73008
[2] Rajasooriya, S.M., Tsokos, C.P. and Kaluarachchi, P.K. (2016) Stochastic Modelling
of Vulnerability Life Cycle and Security Risk Evaluation. Journal of information
Security, 7, 269-279. https://doi.org/10.4236/jis.2016.74022
[3] Rajasooriya, S.M., Tsokos, C.P. and Kaluarachchi, P.K. (2017) Cybersecurity: Non-
linear Stochastic models for Predicting the Exploitability. Journal of information
Security, 8, 125-140. https://doi.org/10.4236/jis.2017.82009
[4] 2016 U.S Government Cybersecurity Report.
https://cdn2.hubspot.net/hubfs/533449/SecurityScorecard_2016_Govt_Cybersecurit
y_Report.pdf
[5] Symantec, Internet Security Threat Report 2016-Volume 21.
https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf
[6] NVD, National Vulnerability Database. http://nvd.nist.gov/
[7] Kijsanayothin, P. (2010) Network Security Modeling with Intelligent and Complex-
ity Analysis. Ph.D. Dissertation, Texas Tech University, Lubbock, Texas, U.S.
[8] Schiffman, M. Common Vulnerability Scoring System (CVSS).
http://www.first.org/cvss/
[9] CVE Details. http://www.cvedetails.com/
[10] Frei, S. (2009) Security Econometrics: The Dynamics of (IN) Security, Ph.D. Dis-
sertation at ETH Zurich.
[11] Joh, H. and Malaiya, Y.K. (2010) A Framework for Software Security Risk Evalua-
tion Using the Vulnerability Lifecycle and CVSS Metrics, Proc. International
Workshop on Risk and Trust in Extended Enterprises, November 2010, 430-434.
[12] Alhazmi, O.H., Malaiya, Y.K. and Ray, I. (2007) Measuring, Analyzing and Predict-
ing Security Vulnerabilities in Software Systems. Computers and Security Journal,
26, 219-228. https://doi.org/10.1016/j.cose.2006.10.002
[13] Alhazmi, O.H. and Malaiya, Y.K. (2008) Application of Vulnerability Discovery
Models to Major Operating Systems. IEEE Transactions on Reliability, 57, 14-22.
https://doi.org/10.1109/TR.2008.916872
[14] Alhazmi, O.H. and Malaiya, Y.K. (2005) Modeling the Vulnerability Discovery
Process. Proceedings of 16th International Symposium on Software Reliability En-
gineering, Chicago, 8-11 November 2005, 129-138.
https://doi.org/10.1109/ISSRE.2005.30
[15] Lawler, G.F. (2006) Introduction to Stochastic processes. 2nd Edition, Chapman and
Hall/CRC Taylor and Francis Group, London, New York.
[16] Noel, S., Jacobs, M., Kalapa, P. and Jajodia, S. (2005) Multiple Coordinated Views
for Network Attack Graphs. Proceedings of the IEEE Workshops on Visualization
for Computer Security, Minneapolis, October 2005, 99-106.
[17] Mehta, V., Bartzis, C., Zhu, H., Clarke, E.M. and Wing, J.M. (2006) Ranking Attack
Graphs. In: Zamboni, D. and Krugel, C., Eds., Recent Advances in Intrusion Detec-
tion, Volume 4219 of Lecture Notes in Computer Science, Springer, Berlin, 127-144.
[18] Abraham, S. and Nair, S. (2014) Cyber Security Analytics: A Stochastic Model for
Security Quantification using Absorbing Markov Chains. Journal of Communica-
tions, 9, 899-907. https://doi.org/10.12720/jcm.9.12.899-907
[19] Jajodia, S. and Noel, S. (2005) Advanced Cyber Attack Modeling, Analysis, and Vi-
sualization. 14th USENIX Security Symposium, Technical Report 2010, George
Mason University, Fairfax.
[20] Wang, L., Singhal, A. and Jajodia, S. (2007) Measuring Overall Security of Network
Configurations using Attack Graphs. Data and Applications Security, 21, 98-112.
https://doi.org/10.1007/978-3-540-73538-0_9
[21] Wang, L., Islam, T., Long, T., Singhal, A. and Jajodia, S. (2008) An Attack
Graph-Based Probabilistic Security Metric. DAS 2008, LNCS 5094, 283-296.