Skip to content

Commit 0dc665b

Browse files
committed
Deployed e6ea877 with MkDocs version: 1.5.3
1 parent 07ba24e commit 0dc665b

File tree

4 files changed

+21
-5
lines changed

4 files changed

+21
-5
lines changed

epss/LEV/index.html

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1995,7 +1995,7 @@ <h1 id="introduction-to-lev">Introduction to LEV<a class="headerlink" href="#int
19951995
<li>why it matters for day-to-day prioritization </li>
19961996
<li>how to apply it alongside <abbr title="Exploit Prediction Scoring System">EPSS</abbr> and <abbr title="Known Exploited Vulnerability">KEV</abbr> </li>
19971997
</ul>
1998-
<p><img alt="🧑‍💻" class="twemoji" src="https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.0.3/assets/svg/1f9d1-200d-1f4bb.svg" title=":technologist:" /> [Source Code] will be provided for LEV. Instead of making invalid assumptions to optimize the computation for LEV2 (handling "<abbr title="Exploit Prediction Scoring System">EPSS</abbr> scores as covering only a single day by dividing them by 30": <span class="arithmatex">\(P_1 \approx P_{30}/30\)</span>), it will use the correct algorithm but optimize with concurrent processing.</p>
1998+
<p><img alt="🧑‍💻" class="twemoji" src="https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.0.3/assets/svg/1f9d1-200d-1f4bb.svg" title=":technologist:" /> <a href="https://github.com/RiskBasedPrioritization/LEV/">Source Code</a> is a clean-room implementation of the LEV source code i.e. from the whitepaper only. It is not associated with the LEV paper authors.</p>
19991999
</div>
20002000
<h2 id="what-is-lev">What is LEV?<a class="headerlink" href="#what-is-lev" title="Permanent link">&para;</a></h2>
20012001
<p><strong>Likely Exploited Vulnerabilities (LEV) is a probabilistic score proposed by NIST to estimate the chance that a published vulnerability (<abbr title="CVE Common Vulnerability and Exposures. A standardized list of publicly known vulnerabilities and exposures maintained by the MITRE Corporation.">CVE</abbr>) has already been exploited in the wild</strong>. </p>
@@ -2176,8 +2176,9 @@ <h3 id="lev2-approximation">LEV2 Approximation<a class="headerlink" href="#lev2-
21762176
</div>
21772177
<p>LEV handles <abbr title="Exploit Prediction Scoring System">EPSS</abbr> scores as covering only a single day by dividing them by 30: <span class="arithmatex">\(P_1 \approx P_{30}/30\)</span></p>
21782178
<p>Dividing a 30-day probability by 30 to get a 1-day probability generally <strong>does not make sense</strong> in a rigorous probabilistic context.</p>
2179+
<p>An example run of the code from <abbr title="Exploit Prediction Scoring System">EPSS</abbr> to 2023-3-7 to 2025-5-31 showed that this approximation resulted in +674 vulnerabilities (+1.57%) less than the rigorous approach.</p>
21792180
<figure>
2180-
<p><img alt="" src="../../assets/images/p30_error.png" />
2181+
<p><img alt="" src="../../assets/images/p30_error.png" width="800px" />
21812182
</p>
21822183
<figcaption></figcaption>
21832184
</figure>
@@ -2198,6 +2199,13 @@ <h3 id="lev2-approximation">LEV2 Approximation<a class="headerlink" href="#lev2-
21982199
computation and increases the equation's responsiveness to changing scores (especially for
21992200
newly released vulnerabilities).</p>
22002201
</div>
2202+
<div class="admonition tip">
2203+
<p class="admonition-title">Tip</p>
2204+
<p>Using standard concurrent processing per the source code, the approximation is not required on a standard computer.</p>
2205+
<ul>
2206+
<li>the code completes in minutes </li>
2207+
</ul>
2208+
</div>
22012209
<h3 id="independent-events-assumption">Independent Events Assumption<a class="headerlink" href="#independent-events-assumption" title="Permanent link">&para;</a></h3>
22022210
<div class="admonition warning">
22032211
<p class="admonition-title"><strong>Attacks Aren't Random</strong></p>

print_page/index.html

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4598,7 +4598,7 @@ <h2 class='nav-section-title' id='section-nist-lev'>
45984598
<li>why it matters for day-to-day prioritization </li>
45994599
<li>how to apply it alongside <abbr title="Exploit Prediction Scoring System">EPSS</abbr> and <abbr title="Known Exploited Vulnerability">KEV</abbr> </li>
46004600
</ul>
4601-
<p><img alt="🧑‍💻" class="twemoji" src="https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.0.3/assets/svg/1f9d1-200d-1f4bb.svg" title=":technologist:" /> [Source Code] will be provided for LEV. Instead of making invalid assumptions to optimize the computation for LEV2 (handling "<abbr title="Exploit Prediction Scoring System">EPSS</abbr> scores as covering only a single day by dividing them by 30": <span class="arithmatex">\(P_1 \approx P_{30}/30\)</span>), it will use the correct algorithm but optimize with concurrent processing.</p>
4601+
<p><img alt="🧑‍💻" class="twemoji" src="https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.0.3/assets/svg/1f9d1-200d-1f4bb.svg" title=":technologist:" /> <a href="https://github.com/RiskBasedPrioritization/LEV/">Source Code</a> is a clean-room implementation of the LEV source code i.e. from the whitepaper only. It is not associated with the LEV paper authors.</p>
46024602
</div>
46034603
<h2 id="epss-lev-what-is-lev">What is LEV?<a class="headerlink" href="#epss-lev-what-is-lev" title="Permanent link">&para;</a></h2>
46044604
<p><strong>Likely Exploited Vulnerabilities (LEV) is a probabilistic score proposed by NIST to estimate the chance that a published vulnerability (<abbr title="CVE Common Vulnerability and Exposures. A standardized list of publicly known vulnerabilities and exposures maintained by the MITRE Corporation.">CVE</abbr>) has already been exploited in the wild</strong>. </p>
@@ -4779,8 +4779,9 @@ <h3 id="epss-lev-lev2-approximation">LEV2 Approximation<a class="headerlink" hre
47794779
</div>
47804780
<p>LEV handles <abbr title="Exploit Prediction Scoring System">EPSS</abbr> scores as covering only a single day by dividing them by 30: <span class="arithmatex">\(P_1 \approx P_{30}/30\)</span></p>
47814781
<p>Dividing a 30-day probability by 30 to get a 1-day probability generally <strong>does not make sense</strong> in a rigorous probabilistic context.</p>
4782+
<p>An example run of the code from <abbr title="Exploit Prediction Scoring System">EPSS</abbr> to 2023-3-7 to 2025-5-31 showed that this approximation resulted in +674 vulnerabilities (+1.57%) less than the rigorous approach.</p>
47824783
<figure>
4783-
<p><img alt="" src="../assets/images/p30_error.png" />
4784+
<p><img alt="" src="../assets/images/p30_error.png" width="800px" />
47844785
</p>
47854786
<figcaption></figcaption>
47864787
</figure>
@@ -4801,6 +4802,13 @@ <h3 id="epss-lev-lev2-approximation">LEV2 Approximation<a class="headerlink" hre
48014802
computation and increases the equation's responsiveness to changing scores (especially for
48024803
newly released vulnerabilities).</p>
48034804
</div>
4805+
<div class="admonition tip">
4806+
<p class="admonition-title">Tip</p>
4807+
<p>Using standard concurrent processing per the source code, the approximation is not required on a standard computer.</p>
4808+
<ul>
4809+
<li>the code completes in minutes </li>
4810+
</ul>
4811+
</div>
48044812
<h3 id="epss-lev-independent-events-assumption">Independent Events Assumption<a class="headerlink" href="#epss-lev-independent-events-assumption" title="Permanent link">&para;</a></h3>
48054813
<div class="admonition warning">
48064814
<p class="admonition-title"><strong>Attacks Aren't Random</strong></p>

search/search_index.json

Lines changed: 1 addition & 1 deletion
Large diffs are not rendered by default.

sitemap.xml.gz

0 Bytes
Binary file not shown.

0 commit comments

Comments
 (0)