tuning as part of our future work. For the purpose of
our analysis, we chose values of the parameters that
maximized the correlation between our scores and
CWE scores.
7 CONCLUSIONS
In this paper, we have introduced metrics to en-
able practical and effective application of graph-based
configuration analytics and optimization. Our sys-
tem of metrics builds upon literature on vulnerability
graphs and vulnerability scoring, and can effectively
complement systems like SCIBORG, a graph-based
framework providing a fully automated pipeline to in-
gest information about a networked system, build a
graph model of the system based on this information,
and recommend configuration changes to optimize se-
curity while preserving functionality. In particular,
we defined metrics to evaluate (i) the likelihood of ex-
ploiting a vulnerability, (ii) probability distributions
over the edges of a vulnerability graph, and (iii) ex-
posure factors of system components to vulnerabili-
ties. Our approach builds upon standard vulnerabil-
ity scoring systems, and we showed that the proposed
metrics can be easily extended. We have evaluated
our approach against the Common Weakness Scoring
System (CWSS), showing a high degree of correla-
tion between CWE scores and our metrics. As part
of our future work, we plan to explore tuning of the
parameters used in the likelihood and exposure factor
equations and develop an overall metric to score and
compare configurations.
ACKNOWLEDGEMENTS
This work was funded by the US Department of De-
fense under the DARPA ConSec program. Any opin-
ions expressed herein are those of the authors and do
not necessarily reflect the views of the U.S. Depart-
ment of Defense or any other agency of the U.S. Gov-
ernment.
REFERENCES
(2017). OWASP top 10 - 2017: The ten most critical
web application security risks. Technical report, The
OWASP Foundation.
Albanese, M. and Jajodia, S. (2018). A graphical model
to assess the impact of multi-step attacks. Journal of
Defense Modeling and Simulation, 15(1):79–93. Se-
lected by the Guest Editor, Alexander Kott, as an arti-
cle of particular value.
Albanese, M., Pugliese, A., and Subrahmanian, V.
(2013). Fast activity detection: Indexing for tempo-
ral stochastic automaton-based activity models. IEEE
Transactions on Knowledge and Data Engineering,
25(2):360–373.
Ammann, P., Wijesekera, D., and Kaushik, S. (2002).
Scalable, graph-based network vulnerability analy-
sis. In Proceedings of the 9th ACM Conference on
Computer and Communications Security (CCS 2002),
pages 217–224, Washington, DC, USA. ACM.
Bahl, P., Barham, P., Black, R., Chandra, R., Goldszmidt,
M., Isaacs, R., Kandula, S., Li, L., MacCormick, J.,
Maltz, D., Mortier, R., Wawrzoniak, M., and Zhang,
M. (2006). Discovering dependencies for network
management. In Proceedings of the 5th ACM Work-
shop on Hot Topics in Networking (HotNets-V), pages
97–102, Irvine, CA, USA. ACM.
Bopche, G. S., Rai, G. N., Denslin Brabin, D. R., and
Mehtre, B. M. (2019). A proximity-based measure
for quantifying the risk of vulnerabilities. In Thampi,
S. M., Perez, G. M., Ko, R., and Rawat, D. B., edi-
tors, Proceedings of the 7th International Symposium
on Security in Computing and Communication (SSCC
2019), volume 1208 of Communications in Computer
and Information Science, pages 41–59. Springer.
Jajodia, S. and Albanese, M. (2017). Theory and Models
for Cyber Situation Awareness, volume 10030 of Lec-
ture Notes in Computer Science, chapter An Integrated
Framework for Cyber Situation Awareness, pages 29–
46. Springer.
Jajodia, S., Noel, S., and O’Berry, B. (2005). Managing
Cyber Threats: Issues, Approaches, and Challenges,
volume 5 of Massive Computing, chapter Topological
Analysis of Network Attack Vulnerability, pages 247–
266. Springer.
Kourtellis, N., De Francisci Morales, G., and Bonchi, F.
(2015). Scalable online betweenness centrality in
evolving graphs. IEEE Transactions on Knowledge
and Data Engineering, 27(9):2494–2506.
Leversage, D. J. and Byres, E. J. (2008). Estimating a sys-
tem’s mean time-to-compromise. IEEE Security &
Privacy, 6(1):52–60.
Manadhata, P. K. and Wing, J. M. (2011). An attack surface
metric. IEEE Transactions on Software Engineering,
37(3):371–386.
Mukherjee, P. and Mazumdar, C. (2018). Attack difficulty
metric for assessment of network security. In Proceed-
ings of 13th International Conference on Availability,
Reliability and Security (ARES 2018), Hamburg, Ger-
many. ACM.
Natrajan, A., Ning, P., Liu, Y., Jajodia, S., and Hutchin-
son, S. E. (2012). NSDMiner: Automated discov-
ery of network service dependencies. In Proceedings
of the 31st Annual IEEE International Conference on
Computer Communications (IEEE INFOCOM 2012),
pages 2507–2515, Orlando, FL, USA. IEEE.
Soroush, H., Albanese, M., Asgari Mehrabadi, M., Iganibo,
I., Mosko, M., Gao, J. H., Fritz, D. J., Rane, S., and
Bier, E. (2020). SCIBORG: Secure configurations
for the IoT based on optimization and reasoning on
Vulnerability Metrics for Graph-based Configuration Security
269