Estimating the Assessment Difficulty of CVSS Environmental Metrics: An Experiment

[Context] The CVSS framework provides several dimensions to score vulnerabilities. The environmental metrics allow security analysts to downgrade or upgrade vulnerability scores based on a company’s computing environments and security requirements. [Question] How difficult is for a human assessor to change the CVSS environmental score due to changes in security requirements (let alone technical configurations) for PCI-DSS compliance for networks and systems vulnerabilities of different type? [Results] A controlled experiment with 29 MSc students shows that given a segmented network it is significantly more difficult to apply the CVSS scoring guidelines on security requirements with respect to a flat network layout, both before and after the network has been changed to meet the PCI-DSS security requirements. The network configuration also impact the correctness of vulnerabilities assessment at system level but not at application level. [Contribution] This paper is the first attempt to empirically investigate the guidelines for the CVSS environmental metrics. We discuss theoretical and practical key aspects needed to move forward vulnerability assessments for large scale systems.

[1]  Yuqing Zhang,et al.  Improving VRSS-based vulnerability prioritization using analytic hierarchy process , 2012, J. Syst. Softw..

[2]  Ying Dong,et al.  A Novel Automatic Severity Vulnerability Assessment Framework , 2015, J. Commun..

[3]  Tony Bradley,et al.  PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance , 2007 .

[4]  Hannes Holm,et al.  An expert-based investigation of the Common Vulnerability Scoring System , 2015, Comput. Secur..

[5]  Karen A. Scarfone,et al.  SP 800-117. Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.0 , 2010 .

[6]  Anton A. Chuvakin,et al.  PCI Compliance, Third Edition: Understand and Implement Effective PCI Data Security Standard Compliance , 2012 .

[7]  Fabio Massacci,et al.  Security triage: A report of a lean security requirements methodology for cost-effective security analysis , 2014, 2014 IEEE 4th International Workshop on Empirical Requirements Engineering (EmpiRE).

[8]  Karen A. Scarfone,et al.  Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.0 , 2010 .

[9]  Sushil Jajodia,et al.  Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks , 2014, ESORICS.

[10]  Siv Hilde Houmb,et al.  Quantifying security risk level from CVSS estimates of frequency and impact , 2010, J. Syst. Softw..

[11]  Bernhard Plattner,et al.  Large-scale vulnerability analysis , 2006, LSAD '06.

[12]  Karl Aberer,et al.  A Non-Intrusive and Context-Based Vulnerability Scoring Framework for Cloud Services , 2016, ArXiv.

[13]  Per Runeson,et al.  Using Students as Experiment Subjects – An Analysis on Graduate and Freshmen Student Data , 2003 .

[14]  Fabio Massacci,et al.  Comparing Vulnerability Severity and Exploits Using , 2014 .

[15]  Laurent Gallon,et al.  Using CVSS in Attack Graphs , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[16]  Fabio Massacci,et al.  Comparing Vulnerability Severity and Exploits Using Case-Control Studies , 2013, TSEC.

[17]  Yashwant K. Malaiya,et al.  Comparing and Evaluating CVSS Base Metrics and Microsoft Rating System , 2015, 2015 IEEE International Conference on Software Quality, Reliability and Security.

[18]  Sushil Jajodia,et al.  Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks , 2016, IEEE Transactions on Information Forensics and Security.

[19]  Robin R. Pennington,et al.  The Effects of Information Overload on Software Project Risk Assessment , 2007, Decis. Sci..

[20]  Claes Wohlin,et al.  Using Students as Subjects—A Comparative Study of Students and Professionals in Lead-Time Impact Assessment , 2000, Empirical Software Engineering.

[21]  Ling Gao,et al.  An Improved CVSS-based Vulnerability Scoring Mechanism , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.

[22]  Aine MacDermott,et al.  A Methodology to Develop Dynamic Cost-Centric Risk Impact Metrics , 2015, 2015 International Conference on Developments of E-Systems Engineering (DeSE).

[23]  Mathias Ekstedt,et al.  Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.

[24]  Umesh Kumar Singh,et al.  Quantitative Security Risk Evaluation using CVSS Metrics by Estimation of Frequency and Maturity of Exploit , 2016 .