Projects per year
Abstract
Mechanisms for large-scale vulnerability notifications have been confronted with disappointing remediation rates. It has proven difficult to reach the relevant party and, once reached, to incentivize them to act. We present the first empirical study of a potentially more effective mechanism: Quarantining the vulnerable resource until it is remediated. We have measured the remediation rates achieved by a medium-sized ISP for 1, 688 retail customers running open DNS resolvers or Multicast DNS services. These servers can be abused in UDP-based amplification attacks. We assess the effectiveness of quarantining by comparing remediation with two other groups: One group which was notified but not quarantined and another group where no action was taken. We find very high remediation rates for the quarantined users, 87%, even though they can self-release from the quarantine environment. Of those who received the email-only notification, 76% remediated. Surprisingly, over half of the customers who were not notified at all also remediated, though this is tied to the fact that many observations of vulnerable servers are transient. All in all, quarantining appears more effective than other notification and remediation mechanisms, but it is also clear that it can not be deployed as a general solution for Internet-wide notifications.
Original language | English |
---|---|
Title of host publication | Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019 |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Pages | 326-339 |
Number of pages | 14 |
ISBN (Electronic) | 9781728111476 |
DOIs | |
Publication status | Published - 2019 |
Event | 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019 - Stockholm, Sweden Duration: 17 Jun 2019 → 19 Jun 2019 |
Publication series
Name | Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019 |
---|
Conference
Conference | 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019 |
---|---|
Country/Territory | Sweden |
City | Stockholm |
Period | 17/06/19 → 19/06/19 |
Keywords
- Vulnerability notifications
Fingerprint
Dive into the research topics of 'Tell me you fixed it: Evaluating vulnerability notifications via quarantine networks'. Together they form a unique fingerprint.Projects
- 1 Active
-
Cybersecurity (TPM)
van Eeten, M. J. G., Hernandez Ganan, C., Gürses, F. S., van Wegberg, R. S., Parkin, S. E., Zhauniarovich, Y., van Engelenburg, S. H., Kadenko, N. I., Labunets, K., Akyazi, U., Bouwman, X. B., Jansen, B. A., Kaur, M., Al Alsadi, A., Lone, Q. B., Turcios Rodriguez, E. R., Vermeer, M., van Harten, V. T. C., Vetrivel, S., Oomens, E. C., Kustosch, L. F., Bisogni, F., Ciere, M., Fiebig, T., Korczynski, M. T., Moreira Moura, G. C., Noroozian, A., Pieters, W., Tajalizadehkhoob, S., Dacier, B. H. A., San José Sanchez, J., Çetin, F. O. & Zannettou, S.
1/01/10 → …
Project: Research