of cyber attacks. For example, the attacks can be
social engineering or bruteforcing attacks. These
types of attacks do not exploit vulnerabilities found in
databases. Using measurements, such as, TTC is also
an oversimplification of the problem with estimating
the probability or time taken for an attack since it it
greatly dependent on the type of attack and to some
extent luck. To acknowledge that the TTC is an esti-
mate and we cannot be certain of an exact TTC, we
suggest representing TTC
ICS
as a log-normal prob-
ability distribution according to the work by Holm
et. al. (Holm, 2014). By representing the estimated
TTC
ICS
values for the different skill levels as a log-
normal probability distribution we are able to add un-
certainty to the result instead of representing it as a
fixed value. We choose to consider zero-day attacks
as part of process 3 because even if an attacker for ex-
ample bought a readily available and previously un-
known exploit, the work to create it would still be es-
timated by process 3. In this way, the estimate would
take both the exploit developer and the exploit ex-
ecutor time into consideration. Parameters that could
potentially be added to calculate TTC is number of
open ports, how often the software is patched, does
the engineers have security training et cetera. We do
not take this parameters into consideration in this arti-
cle but consider these additions as part of future work
since they are related to configurations and the envi-
ronment of specific ICS systems.
Since the TTC
ICS
is reliant on the ICS vulnerabil-
ity dataset (Thomas and Chothia, 2020), future work
includes creating a tool to automatically include infor-
mation from the dataset so that the estimated TTC
ICS
value is dynamic and automatically updates if there
are any changes in the dataset. Regarding the draw-
backs of Metasploit for exploit information, future
work could include a solution to this problem. Some
exploits include the CVE that it exploits, which would
make it possible to match all CVEs in the ICS Vulner-
ability Dataset to all exploits for that CVE and thereby
extracting a list of exploits.
ACKNOWLEDGEMENTS
This research was funded by Swedish Centre for
Smart Grids and Energy Storage (SweGRIDS) and
the centre for Resilient Information and Control Sys-
tems (RICS).
REFERENCES
Ablon, L. and Bogart, A. (2017). Zero Days, Thousands of
Nights: The Life and Times of Zero-Day Vulnerabil-
ities and Their Exploits. RAND Corporation, Santa
Monica, CA.
Andreeva, O., Gordeychik, S., Gritsai, G., Kochetova, O.,
Potseluevskaya, E., Sidorova, S. I., and Timorin,
A. A. (2017). Industrial control systems vulnerabil-
ities statistics. https://media.kasperskycontenthub.
com/wp-content/uploads/sites/43/2016/07/07190426/
KL
REPORT ICS Statistic vulnerabilities.pdf.
Ashcraft, J., Zafra, D. K., and Brubaker, N. (2020).
Threat research. https://www.fireeye.com/blog/threat-
research/2020/03/monitoring-ics-cyber-operation-
tools-and-software-exploit-modules.html.
Baines, J. (2021). Whitepaper: Examining ics/ot exploits:
Findings from more than a decade of data. Technical
report, Dragos, Inc.
FIRST (2021). Common vulnerability scoring system sig.
Garcia, L. and Zonouz, S. (2014). Tmq: Threat model quan-
tification in smart grid critical infrastructures. In 2014
IEEE International Conference on Smart Grid Com-
munications (SmartGridComm), pages 584–589.
Holm, H. (2014). A large-scale study of the time required
to compromise a computer system. IEEE Transactions
on Dependable and Secure Computing, 11(1):2–15.
Johnson, P., Gorton, D., Robert, L., and Ekstedt, M. (2016).
Time between vulnerability disclosures: A measure of
software product vulnerability. Computers & Security,
62.
Jonsson, E. and Olovsson, T. (1997). A quantitative model
of the security intrusion process based on attacker be-
havior. IEEE Transactions on Software Engineering,
23(4):235–245.
Leversage, D. J. and Byres, E. J. (2008). Estimating a sys-
tem’s mean time-to-compromise. IEEE Security Pri-
vacy, 6(1):52–60.
Major, J. (2002). Advanced techniques for modeling terror-
ism risk. The Journal of Risk Finance, 4:15–24.
Mavroeidis, V., Hohimer, R., Casey, T., and Josang, A.
(2021). Threat actor type inference and characteriza-
tion within cyber threat intelligence.
Maynard, P., Mclaughlin, K., and Sezer, S. (2020). De-
composition and sequential-and analysis of known
cyber-attacks on critical infrastructure control sys-
tems. Journal of Cybersecurity, 6.
McQueen, M. A., Boyer, W. F., Flynn, M. A., and Beitel,
G. A. (2006). Time-to-compromise model for cyber
risk reduction estimation. In Gollmann, D., Massacci,
F., and Yautsiukhin, A., editors, Quality of Protection,
pages 49–64, Boston, MA. Springer US.
Metasploit (2021). The world’s most used penetration test-
ing framework.
Mission Support Center, I. N. L. (2017). Cyber
threat and vulnerability analysis of the u.s. elec-
tric sector, mission support center analysis report.
https://www.osti.gov/servlets/purl/1337873.
NIST (2021). General information.
https://nvd.nist.gov/general.
ICISSP 2022 - 8th International Conference on Information Systems Security and Privacy
106