Unified Quantitative Evaluation of System Severity: Leveraging Time to Compromise and Cost-Benefit Analysis for Enhanced vulnerability Risk Assessment

Network security remains a critical concern in today’s fast-paced tech world due to the dynamic challenges posed by high-speed networks. Despite using various security tools like firewalls and intrusion detection systems, managing multiple threats simultaneously is time-consuming. Existing vulnerabi...

Full description

Saved in:
Bibliographic Details
Published inJournal of network and systems management Vol. 33; no. 4; p. 100
Main Authors Jyoti, Bansal, Urvashi, Sikka, Geeta, Awasthi, Lalit Kumar, Verma, Harsh Kumar
Format Journal Article
LanguageEnglish
Published New York Springer US 01.10.2025
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN1064-7570
1573-7705
DOI10.1007/s10922-025-09975-4

Cover

More Information
Summary:Network security remains a critical concern in today’s fast-paced tech world due to the dynamic challenges posed by high-speed networks. Despite using various security tools like firewalls and intrusion detection systems, managing multiple threats simultaneously is time-consuming. Existing vulnerability assessment tools struggle with complex attack scenarios, particularly those involving chained attacks relying on CVSS metrics. Thus, there’s a pressing need for a new strategy to strengthen network security against evolving threats. Attack graphs emerge as a powerful solution, especially for chained attacks, offering better ranking of attack paths and insights for system administrators. This study proposes a new approach, shifting focus from individual vulnerability severity to the overall severity of hosts or systems. The methodology determines system severity considering inherent vulnerabilities, along with exploit time and cost function. This shift allows a more comprehensive understanding of system security, addressing the complexities of chained attacks. The proposed methodology centres on three key elements: calculating average exploit time, modifying the CVSS v3.1 framework based on exploit time, and calculating a cost function for prioritizing attack paths. Results highlight the need to address 33% of existing vulnerabilities, focusing on 3 out of 9 hosts to enhance overall network security.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1064-7570
1573-7705
DOI:10.1007/s10922-025-09975-4