What is it about?

This paper introduces a new way to measure how vulnerable complex computer systems are to cyber attacks. Traditional methods only looked at how many vulnerabilities exist on the system's surface. Our new method, called "attack volume metrics," digs deeper by considering how vulnerabilities interconnect and how attacks can spread through these connections. This approach helps better predict and mitigate the potential damage from cyber threats, making systems more secure. We tested this method on real-world systems and found it to be effective and scalable.

Featured Image

Why is it important?

This work is groundbreaking because it introduces a more comprehensive way to measure cyber attack risks in complex systems. Unlike traditional methods that only count surface vulnerabilities, our approach considers the intricate connections and potential attack pathways within the system. This depth of analysis is crucial for better predicting and mitigating cyber threats, especially as systems become more interconnected. By providing a clearer picture of potential risks, this method can significantly enhance cybersecurity strategies, making it highly relevant and impactful in today's digital landscape.

Perspectives

Writing this paper was a rewarding experience as it allowed me to collaborate with a great team of experts. I believe our work on attack volume metrics addresses a critical gap in cybersecurity, offering a more nuanced and comprehensive approach to assessing system vulnerabilities. This project has deepened my understanding of the interconnected nature of cyber threats and the importance of considering these relationships in security assessments. I hope this paper inspires further research and development in making complex systems more resilient to cyber attacks.

Dr. MASSIMILIANO ALBANESE
George Mason University

Read the Original

This page is a summary of: An attack volume metric, Security and Privacy, January 2023, Wiley,
DOI: 10.1002/spy2.298.
You can read the full text:

Read

Contributors

The following have contributed to this page