You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<p>Assuming vulnerability exploitation events occur independently each day simplifies calculations but likely introduces inaccuracies, as real-world exploitation patterns are not random.</p>
2237
2237
</div>
2238
-
<p><strong>Independent Events Assumption:</strong> If we assume the events (vulnerabilities being exploited) are independent day-to-day, then the probability of <em>not</em> being exploited over 30 days would be the product of the probabilities of <em>not</em> being exploited on each individual day.</p>
2238
+
<p>Under this assumption:</p>
2239
2239
<ul>
2240
-
<li>Let <spanclass="arithmatex">\(P_1\)</span> be the daily probability of exploitation</li>
2241
-
<li>The probability of <em>not</em> being exploited on a given day is <spanclass="arithmatex">\((1 - P_1)\)</span></li>
2242
-
<li>The probability of <em>not</em> being exploited over 30 days is <spanclass="arithmatex">\((1 - P_1)^{30}\)</span></li>
2243
-
<li>Therefore, the probability of <em>being</em> exploited over 30 days is <spanclass="arithmatex">\(1 - (1 - P_1)^{30}\)</span></li>
2244
-
<li>If you're given <spanclass="arithmatex">\(P_{30}\)</span> (the 30-day likelihood), you'd solve <spanclass="arithmatex">\(P_{30} = 1 - (1 - P_1)^{30}\)</span> for <spanclass="arithmatex">\(P_1\)</span>. This is a much more complex calculation than simple division</li>
2240
+
<li>Daily probability of exploitation is denoted by <spanclass="arithmatex">\(P_1\)</span>.</li>
2241
+
<li>Probability of not being exploited on any given day is <spanclass="arithmatex">\((1 - P_1)\)</span>.</li>
2242
+
<li>Probability of not being exploited over 30 days is <spanclass="arithmatex">\((1 - P_1)^{30}\)</span>.</li>
2243
+
<li>Thus, probability of being exploited within 30 days is <spanclass="arithmatex">\(1 - (1 - P_1)^{30}\)</span>.</li>
2244
+
<li>Given the 30-day exploitation likelihood <spanclass="arithmatex">\(P_{30}\)</span>, the daily probability <spanclass="arithmatex">\(P_1\)</span> is calculated by solving: <spanclass="arithmatex">\(P_{30} = 1 - (1 - P_1)^{30}\)</span>.</li>
2245
2245
</ul>
2246
-
<p>The <strong>Independent Events Assumption</strong> is not valid because:</p>
2246
+
<p>However, the Independent Events Assumption is problematic because:</p>
2247
2247
<ul>
2248
-
<li>The <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> data shows that signature detections do have patterns and are not entirely independent events. See <ahref="https://www.cyentia.com/epss-study/">detailed analysis of exploitation patterns over time</a>.</li>
2249
-
<li>Attacks driven by people have patterns e.g., a persistent threat, periodic probing of targets</li>
2248
+
<li>Actual exploitation events display patterns and dependencies, not random occurrences, as shown in <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> exploitation analyses.</li>
2249
+
<li>Human-driven attacks often follow discernible patterns, such as persistent threats or periodic target probing, further invalidating independence.</li>
2250
2250
</ul>
2251
+
<divclass="admonition quote">
2252
+
<pclass="admonition-title">Quote</p>
2253
+
<p>Probability error – the LEV equation (10) makes some mistake or invalid assumption. For example, since (10) takes in multiple scores per probability calculation, it could amplify small dependent errors if the equation incorrectly assumes independence. </p>
2254
+
<p>Page 20 <ahref="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.41.pdf">NIST CSWP 41: "Likely Exploited Vulnerabilities: A Proposed Metric for Vulnerability Exploitation Probability"</a></p>
<pclass="admonition-title"><strong>Rationale is lacking for <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> Scores as Lower Bounds</strong></p>
2254
-
<p>"While <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> scores assume that a vulnerability has not been observed to be exploited in the past".</p>
2255
-
<ul>
2256
-
<li>The <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> model or score is not making this assumption.</li>
2257
-
<li>This is not the same as the <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> model not using past exploitation data directly to feed the model.</li>
2258
-
</ul>
2259
-
<p>The "<abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> Scores as Lower Bounds" rationale from the NIST CSWP 41 paper basically says:
2260
-
"If the <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> IDS data sees an actual attack attempt (so true positive in the validation data), the <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> score is not set to 1 for that day. So the <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> score on that day is an under-estimate."</p>
2258
+
<pclass="admonition-title"><strong>Rationale for <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> Scores as Lower Bounds</strong></p>
2259
+
<p>The "<abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> Scores as Lower Bounds" rationale from the NIST CSWP 41 paper is basically saying:</p>
2260
+
<p><em>"If the <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> IDS data sees an actual attack attempt (so true positive in the validation data), the <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> score is not set to 1 for that day. So the <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> score on that day is an under-estimate."</em></p>
<p>Assuming vulnerability exploitation events occur independently each day simplifies calculations but likely introduces inaccuracies, as real-world exploitation patterns are not random.</p>
4840
4840
</div>
4841
-
<p><strong>Independent Events Assumption:</strong> If we assume the events (vulnerabilities being exploited) are independent day-to-day, then the probability of <em>not</em> being exploited over 30 days would be the product of the probabilities of <em>not</em> being exploited on each individual day.</p>
4841
+
<p>Under this assumption:</p>
4842
4842
<ul>
4843
-
<li>Let <span class="arithmatex">\(P_1\)</span> be the daily probability of exploitation</li>
4844
-
<li>The probability of <em>not</em> being exploited on a given day is <span class="arithmatex">\((1 - P_1)\)</span></li>
4845
-
<li>The probability of <em>not</em> being exploited over 30 days is <span class="arithmatex">\((1 - P_1)^{30}\)</span></li>
4846
-
<li>Therefore, the probability of <em>being</em> exploited over 30 days is <span class="arithmatex">\(1 - (1 - P_1)^{30}\)</span></li>
4847
-
<li>If you're given <span class="arithmatex">\(P_{30}\)</span> (the 30-day likelihood), you'd solve <span class="arithmatex">\(P_{30} = 1 - (1 - P_1)^{30}\)</span> for <span class="arithmatex">\(P_1\)</span>. This is a much more complex calculation than simple division</li>
4843
+
<li>Daily probability of exploitation is denoted by <span class="arithmatex">\(P_1\)</span>.</li>
4844
+
<li>Probability of not being exploited on any given day is <span class="arithmatex">\((1 - P_1)\)</span>.</li>
4845
+
<li>Probability of not being exploited over 30 days is <span class="arithmatex">\((1 - P_1)^{30}\)</span>.</li>
4846
+
<li>Thus, probability of being exploited within 30 days is <span class="arithmatex">\(1 - (1 - P_1)^{30}\)</span>.</li>
4847
+
<li>Given the 30-day exploitation likelihood <span class="arithmatex">\(P_{30}\)</span>, the daily probability <span class="arithmatex">\(P_1\)</span> is calculated by solving: <span class="arithmatex">\(P_{30} = 1 - (1 - P_1)^{30}\)</span>.</li>
4848
4848
</ul>
4849
-
<p>The <strong>Independent Events Assumption</strong> is not valid because:</p>
4849
+
<p>However, the Independent Events Assumption is problematic because:</p>
4850
4850
<ul>
4851
-
<li>The <abbr title="Exploit Prediction Scoring System">EPSS</abbr> data shows that signature detections do have patterns and are not entirely independent events. See <a href="https://www.cyentia.com/epss-study/">detailed analysis of exploitation patterns over time</a>.</li>
4852
-
<li>Attacks driven by people have patterns e.g., a persistent threat, periodic probing of targets</li>
4851
+
<li>Actual exploitation events display patterns and dependencies, not random occurrences, as shown in <abbr title="Exploit Prediction Scoring System">EPSS</abbr> exploitation analyses.</li>
4852
+
<li>Human-driven attacks often follow discernible patterns, such as persistent threats or periodic target probing, further invalidating independence.</li>
4853
4853
</ul>
4854
+
<div class="admonition quote">
4855
+
<p class="admonition-title">Quote</p>
4856
+
<p>Probability error – the LEV equation (10) makes some mistake or invalid assumption. For example, since (10) takes in multiple scores per probability calculation, it could amplify small dependent errors if the equation incorrectly assumes independence. </p>
4857
+
<p>Page 20 <a href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.41.pdf">NIST CSWP 41: "Likely Exploited Vulnerabilities: A Proposed Metric for Vulnerability Exploitation Probability"</a></p>
<p class="admonition-title"><strong>Rationale is lacking for <abbr title="Exploit Prediction Scoring System">EPSS</abbr> Scores as Lower Bounds</strong></p>
4857
-
<p>"While <abbr title="Exploit Prediction Scoring System">EPSS</abbr> scores assume that a vulnerability has not been observed to be exploited in the past".</p>
4858
-
<ul>
4859
-
<li>The <abbr title="Exploit Prediction Scoring System">EPSS</abbr> model or score is not making this assumption.</li>
4860
-
<li>This is not the same as the <abbr title="Exploit Prediction Scoring System">EPSS</abbr> model not using past exploitation data directly to feed the model.</li>
4861
-
</ul>
4862
-
<p>The "<abbr title="Exploit Prediction Scoring System">EPSS</abbr> Scores as Lower Bounds" rationale from the NIST CSWP 41 paper basically says:
4863
-
"If the <abbr title="Exploit Prediction Scoring System">EPSS</abbr> IDS data sees an actual attack attempt (so true positive in the validation data), the <abbr title="Exploit Prediction Scoring System">EPSS</abbr> score is not set to 1 for that day. So the <abbr title="Exploit Prediction Scoring System">EPSS</abbr> score on that day is an under-estimate."</p>
4861
+
<p class="admonition-title"><strong>Rationale for <abbr title="Exploit Prediction Scoring System">EPSS</abbr> Scores as Lower Bounds</strong></p>
4862
+
<p>The "<abbr title="Exploit Prediction Scoring System">EPSS</abbr> Scores as Lower Bounds" rationale from the NIST CSWP 41 paper is basically saying:</p>
4863
+
<p><em>"If the <abbr title="Exploit Prediction Scoring System">EPSS</abbr> IDS data sees an actual attack attempt (so true positive in the validation data), the <abbr title="Exploit Prediction Scoring System">EPSS</abbr> score is not set to 1 for that day. So the <abbr title="Exploit Prediction Scoring System">EPSS</abbr> score on that day is an under-estimate."</em></p>
0 commit comments