论文标题
软件更新策略:针对高级持续威胁的定量评估
Software Updates Strategies: a Quantitative Evaluation against Advanced Persistent Threats
论文作者
论文摘要
软件更新减少了开发的机会。但是,由于更新也可以引入破坏变化,因此企业面临着平衡将软件与更新确保需要支持操作的问题的问题。我们提出了一种方法,以定量研究软件更新的有效性策略,以防止高级持续威胁(APTS)攻击。我们考虑策略,供应商更新是企业根据SANS数据将更新从1到7个月延迟更新的唯一限制因素。我们手动策划的APT攻击数据集涵盖了2008年至2020年的86个APT和350个广告系列。它包括有关攻击矢量,受剥削的漏洞(例如0天与公共漏洞)以及受影响的软件和版本的信息。与共同的信念相反,大多数APT运动采用了公开已知的漏洞。如果企业在发布后可以立即更新,那么与等待一个(4.9倍)或三(4.9倍)或三(9.1倍)月的几个月相比,它将面临较低的损害几率。但是,如果受到攻击,它仍可能会从14%到33%的次数损害。在实践中,企业必须在应用更新之前进行回归测试,我们的主要发现是,与更新所有版本更新的公司相比,您可以执行所有可能的更新中的12%,仅限于修复公开已知漏洞的版本,而不会对被妥协的几率进行重大变化。
Software updates reduce the opportunity for exploitation. However, since updates can also introduce breaking changes, enterprises face the problem of balancing the need to secure software with updates with the need to support operations. We propose a methodology to quantitatively investigate the effectiveness of software updates strategies against attacks of Advanced Persistent Threats (APTs). We consider strategies where the vendor updates are the only limiting factors to cases in which enterprises delay updates from 1 to 7 months based on SANS data. Our manually curated dataset of APT attacks covers 86 APTs and 350 campaigns from 2008 to 2020. It includes information about attack vectors, exploited vulnerabilities (e.g. 0-days vs public vulnerabilities), and affected software and versions. Contrary to common belief, most APT campaigns employed publicly known vulnerabilities. If an enterprise could theoretically update as soon as an update is released, it would face lower odds of being compromised than those waiting one (4.9x) or three (9.1x) months. However, if attacked, it could still be compromised from 14% to 33% of the times. As in practice enterprises must do regression testing before applying an update, our major finding is that one could perform 12% of all possible updates restricting oneself only to versions fixing publicly known vulnerabilities without significant changes to the odds of being compromised compared to a company that updates for all versions.