An iterative learning and inference approach to managing dynamic cyber vulnerabilities of complex systems

https://doi.org/10.1016/j.ress.2019.106664Get rights and content

Highlights

  • Address the dynamic nature of cyber-system vulnerabilities through application of an iterative learning and inference approach.

  • Incorporate hidden time-varying system health characteristics that may not be directly observable to cyber-system administrators or managers.

  • Recognize that multiple types of cyber vulnerabilities need to be assessed to provide a holistic assessment for overall system state of health.

Abstract

As modern infrastructure systems become increasingly reliant on cyber technologies and continue to be integrated with physical systems, managing risks from deliberate and non-deliberate sources is a significant research challenge. Unlike strictly physical systems, cyber-enabled physical systems are influenced by dynamic and evolving technologies, environments, and attack mechanisms. As a result, vulnerabilities are rapidly changing and difficult to detect and manage. While there is recent interest in the dynamic properties of performance through resilience analysis, limited research addresses the dynamic nature of cyber-system vulnerability. This paper presents an iterative data-driven learning approach to evaluate and manage vulnerabilities for such complex systems. These time-varying system health characteristics may not be directly observable, but can be inferred using observable indicators. The approach recognizes that multiple types of vulnerabilities need to be included in a holistic system health assessment. The methods are applied to the Common Vulnerability Scoring System (CVSS) database containing thousands of documented cybersecurity vulnerabilities over nearly two decades. We acknowledge the dynamic properties of cyber vulnerability, while also inferring system health using observable data and hidden operational states. The results will be of interest to managers of large-scale cyber-enabled physical systems who are seeking to prioritize system health investments.

Introduction

Cyber attacks have potential to cause significant disruptions to the performance of cyber-enabled physical infrastructure systems. As the importance of cyber infrastructure health becomes increasingly apparent, numerous efforts are underway globally to secure and protect critical national infrastructure systems. For example, in 2018, the United States launched the Cybersecurity and Infrastructure Security Agency (CISA), promoting cybersecurity assessment for the support of critical infrastructures and operations [15]. Similarly, in 2019, the European Union Cybersecurity Act created a permanent mandate for the European Union Agency for Cybersecurity [22]. Within the agency's scope is the intent to protect the cybersecurity network and improve cyber resilience. With increased attention to cybersecurity at a national level, it is critical for government agencies to understand the state of health of their entire cyber infrastructure system. This is a challenging endeavor, as historically, cyber-system modeling literature has addressed security and vulnerability at an organizational level, largely focusing on various software-specific vulnerabilities.

The U.S. National Science Foundation (NSF) defines cyber-physical systems as “engineered systems that are built from, and depend upon, the seamless integration of computation and physical components” [49]. Consider for example reports of software security flaws in vehicles that allow for remote attacks on physical control of vehicles [45], cyber-attacks that can halt operations in shipping, pharmaceuticals, oil and gas, and other industries [25], [56], or large-scale data breaches [32]. Globally, these cyber-enabled physical systems are critical for the movement of people, goods, and services. When compromised, these systems can have disastrous impacts on the safety, security, and economic well-being of organizations [11], [39]. Since application domains comprise of most critical infrastructure systems (such as transportation, energy, communications [18]) and private sector operations involving severe potential health/safety consequences [34], [57], it is critical for owners of these systems to objectively manage system vulnerability and investments as part of enterprise-level risk management processes.

Managing risk for these cyber-enabled physical systems also poses several preventive, reactive, and proactive cybersecurity challenges. These systems involve technologies that are rapidly changing and adapting, with notable recent emergence of: 1) cloud computing [44], 2) large-scale data availability [37], 3) Internet of Things (IoT) capabilities [55], 4) blockchain technologies [60], and 5) sophisticated methods such as hacking exercises and real-world programs used to identify system vulnerabilities [65]. These systems are also sensitive to other dynamic conditions, such as cybersecurity policies, security-related legislation, human error, and operational uncertainties. The impact of these changing conditions can be influenced by several factors in the physical and cyber space, such as: remoteness of the attacker, complexity of the attack, and authentication privileges for the attacker among others [21]. This suggests the need for learning-based vulnerability models that can rapidly adapt to current operational information, emerging conditions, and sudden changes in network characteristics. Additionally, there is need to reconcile vulnerability analyses to the study of zero-day attacks [8] which exploit vulnerabilities that may not yet have even been reported. This suggests that in many cases, the “true” system health due to a vulnerability may not be known by system owners. Instead, owners may observe known vulnerabilities to make generalizations about the overall health of the system.

Operational security management of cyber-enabled physical systems typically involves reactive processes. When a particular vulnerability is discovered, patches are created to minimize or eliminate the vulnerability through some form of enterprise patch management processes [58]. Because no single entity can control each organization's ability to detect and treat cyber vulnerabilities, a national agency or large-scale organization must consider policy-level investments that can minimize vulnerability or exposure of the overall system without directly managing organizational behavior. In some cases, organizations may also focus efforts on proactive processes, such as investing in cyber insurance [5] and increasing system monitoring.

In this paper, we treat an individual organization as a subsystem, thereby assuming a national cyber security agency or large-scale organization as the system of interest. We assume that these subsystems are interdependent, such that an exploited vulnerability in one subsystem can have cascading effects on other connected systems. For example, consider the case of a malicious code spreading across a network [40], possibly causing significant physical damage [13]. Similar to aspects of resilience that do not focus on specific attack scenarios, an overall assessment of vulnerability is not focused on specific vulnerabilities within sub-systems. Instead, overall assessment of vulnerability seeks to understand an inherent characteristic, attribute, or property of the overarching system, with limited knowledge of individual subsystem vulnerabilities. To clarify, we introduce two types of characteristics:

Subsystem vulnerability: Vulnerability characteristics of each organization within the studied system. Each organization is referred to as a subsystem, allowing for each subsystem to manage their own protocol for identifying and treating known vulnerabilities.

Overall system health: System health that is influenced by vulnerability of the interacting subsystems as a whole.

We introduce the term System Posture (SP) to represent metrics that characterize the overall system health. This SP metric can apply to a single system or a system-of-systems that may be geographically dispersed or autonomously managed. We assume the subsystems interact while the system manager has no knowledge or ability to predict the interaction patterns. Therefore, the interactions are treated as unknown or unstructured. This overall system has limited control over the vulnerability management behavior of subsystems, yet is tasked with supporting the maintenance of overall health of the system through monitoring of the SP metric.

While the use of vulnerability scoring and other real-time assessment metrics have been adopted industry-wide, these types of metrics illustrate only current conditions based on steady-state/equilibrium assumptions. These approaches are helpful for near-term reactions to current vulnerabilities, such as immediate patch management practices. However, there is need to use this information to inform strategic and tactical strategies that are able to respond to trends or changes in conditions with recognition that various types of vulnerability conditions may require tailored vulnerability management strategies. We address these shortcomings by developing a data-driven learning and stochastic modeling approach to classify system vulnerabilities. The approach consists of modeling dynamic system vulnerabilities using a hidden state-based approach to understand system posture for overall system health, and identifying system properties that are most important for reinforcement with vulnerability management practices.

To the best of our knowledge, this paper is one of the first to study the dynamic characteristics of cyber-system vulnerabilities, recognizing that the system properties can be adaptive and change rapidly. We also introduce vulnerability metrics while considering both observable and hidden states of such cyber-enabled physical systems. This state-based approach includes model learning, such that it can adapt to changing technologies and conditions. Moreover, we model the “hidden” properties of system vulnerability while acknowledging risks that are considered to be unknown knowns, such that the assessors may not know that they lack some knowledge that potential attackers (or system users) may have. This is consistent with similar attacker-related contexts, in which the system managers have limited knowledge of attacker intents and exploits. It also addresses previous shortcomings of vulnerability assessments, by acknowledging dynamic system properties that can help address zero-day attacks or persistent system attacks. To the best of our knowledge, while this paper represents one of the first efforts to address dynamic properties of system vulnerabilities, the intent is to serve as a springboard for further research that explores other data-driven and statistically well-grounded machine learning/artificial intelligence methods. These methods can be used for optimal determination of model parameters, key system vulnerabilities necessary for modeling, and how system managers should use this information within decision-making processes.

Section 2 provides background on modeling of cyber-system vulnerability, stochastic modeling of hidden system states, and the relevance of the methods to cyber-enabled physical systems. Section 3 presents our iterative learning and inference methodology. Section 4 applies the methodology to a real dataset cataloging all Common Vulnerability Scoring System (CVSS) vulnerabilities over an 18-year period. Section 5 provides concluding remarks and opportunities for future research.

Section snippets

Background

This section provides a background of core issues in the modeling of vulnerability and risk, with particular emphasis on cyber-enabled physical systems. Section 2.1 discusses the modeling of vulnerability. Section 2.2 discusses the role of vulnerability modeling in emerging risk management principles.

Methodology

In light of the challenges and opportunities described above, our proposed methodology is summarized in Fig. 3, noting that each step of the methodology relates directly to a subsection in this paper. The methodological workflow consists of: (1) Modeling system properties and evolution using Markov assumptions for the cyber-enabled physical system, (2) Learning model parameters from historical observable cyber vulnerabilities, (3) Inferring likely system state sequences (referred to as the

Demonstration of methods using CVSS scoring system

This section provides a demonstration of the methods described in Section 3 of this paper. The demonstration of methods uses CVSS scores to provide a foundation for evaluating system vulnerabilities and overall system health. Consider the CVE vulnerability data from the National Vulnerability Database by the National Institute of Standards and Technology. One analysis of historical documented CVSS vulnerabilities [16] that is classified using keyword matching for CVSS Base Scores resulted in

Conclusions

This paper presented an iterative learning and inference approach to evaluate the dynamic properties of vulnerability for cyber-enabled physical systems. The approach distinguishes between subsystem vulnerability (vulnerability of each firm within a larger system), and overall system health (influenced by vulnerability of interacting sub-systems). We introduced four system posture metrics, consisting of: System Posture Metric #1 (Stability), System Posture Metric #2 (Antifragility), System

References (68)

  • G.E. Apostolakis et al.

    A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism

    Risk Anal Int J

    (2005)
  • A. Årnes et al.

    Using hidden markov models to evaluate the risks of intrusions

  • W.S. Baer et al.

    Cyberinsurance in IT security management

    IEEE Secur Privacy

    (2007)
  • Leonard E. Baum

    A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains

    Ann Math Stat

    (1970)
  • Beketov, Mikhail A. HMMCont: Hidden Markov Model for Continuous Observations Processes. 1.0, 2014. R-Packages,...
  • L. Bilge et al.

    Before we knew it: an empirical study of zero-day attacks in the real world

  • Bodeau, D., Graubart, R., LaPadula, L., Kertzner, P., Rosenthal, A., & Brennan, J. (2012). Cyber resiliency metrics,...
  • Bodeau, D., McColumn, C., and Fox, D. (2018). Cyber threat modeling....
  • Jaime C. Cepeda

    Pattern Recognition–Based approach for dynamic vulnerability status prediction

    Dynamic vulnerability assessment and intelligent control: for sustainable power systems

    (2018)
  • T.M. Chen et al.

    Lessons from stuxnet

    Computer

    (2011)
  • S. Chikkagoudar et al.

    Machine learning for cybersecurity

  • CISA. (2018, November 20). Retrieved July 2, 2019, from Department of Homeland Security website:...
  • CVE Details (2018). About www.cvedetails.com. [online] Cvedetails.com. Available at:...
  • Joseph DiRenzo et al.

    The little-known challenge of maritime cyber security

  • DHS (2018). [online] Dhs.gov. Available at:...
  • Dou, W., Tang, W., Wu, X., Qi, L., Xu, X., Zhang, X. and Hu, C., 2018. An insurance theory based optimal...
  • R.O. Duda et al.

    Pattern classification

    (2012)
  • Edgar, T.W., and Manz, D.O. (2017). Research methods for cyber security. Syngress–Elsevier, Cambridge, MA, pp....
  • European Union Agency for Cybersecurity - A new chapter for ENISA [Press Release]. (n.d.). Retrieved July 2, 2019, from...
  • FIRST (2018a). Common Vulnerability Scoring System SIG. [online] FIRST — Forum of Incident Response and Security Teams....
  • FIRST (2018b). Frequently Asked Questions. [online] FIRST — Forum of Incident Response and Security Teams. Available...
  • Henry Foy

    Maersk, WPP and FedEx Still Struggling with Cyber Attack Fallout

    Financ Times Financ Times

    (2017)
  • M. Frigault et al.

    Measuring network security using dynamic bayesian network

  • FTC (2018). Financial institutions and customer information: complying with the safeguards rule. [online] Federal Trade...
  • Cited by (19)

    • Model-based IDS design for ICSs

      2022, Reliability Engineering and System Safety
      Citation Excerpt :

      On the other hand, the second model focuses on the quantitative and qualitative evaluation of the effects of system-specific vulnerabilities and the mitigation measures against them on cyber-security. Chatterjee et al. [15] present an iterative learning approach to evaluate the dynamic properties of vulnerabilities of the CPS. Their approach distinguishes between subsystem vulnerability and overall system health.

    • A clustering-based framework for searching vulnerabilities in the operation dynamics of Cyber-Physical Energy Systems

      2022, Reliability Engineering and System Safety
      Citation Excerpt :

      In this regards, investigation of the system operation dynamics is fundamental. For instance, Ref [9] recognized multiple types of vulnerabilities in time-varying system properties classified by a Hidden Markov Model. Ref [29] proposed a machine learning technique to reveal the time-varying vulnerability features of a CPES and defend them against continuous cyber-attacks.

    View all citing articles on Scopus
    View full text