[go: up one dir, main page]

Skip to main content

Rule-Based Topological Vulnerability Analysis

  • Conference paper
Computer Network Security (MMM-ACNS 2005)

Abstract

Attack graphs represent known attack sequences that attackers can use to penetrate computer networks. Recently, many researchers have proposed techniques for automatically generating attack graphs for a given computer network. These techniques either use model checkers to generate attack graphs and suffer from scalability problems, or they are based on an assumption of monotonicity and are unable to represent real-world situations.

In this paper, we present a vulnerability analysis technique that is more scalable than model-checker-based solutions and more expressive than monotonicity-based solutions. We represent individual attacks as the transition rules of a rule-based system. We define noninterfering rulesets and present efficient, scalable algorithms for those sets. We then consider arbitrary nonmonotonic rulesets and present a series of optimizations which permit us to perform vulnerability assessment efficiently in most practical cases. We motivate the issues and illustrate our techniques using a substantial example.

The work of Pamula and Jajodia was partially supported by the National Science Foundation under grants IIS-0430402 and IIS-0242237, Air Force Research Laboratory, Rome under the grant F30602-00-2-0512, and the Army Research Office under the grant DAAD19-03-1-0257.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, Graph-Based Network Vulnerability Analysis. In: Proceedings of the 9th ACM conference on Computer and Communications Security, pp. 217–224. ACM Press, New York (2002)

    Chapter  Google Scholar 

  2. CERT: CERT Advisory CA-2003-07, Remote Buffer Overflow in Sendmail, http://www.cert.org/advisories/CA-2003-07.html

  3. ADM Crew: BIND NXT Remote Root Exploit, http://adm.freelsd.net/ADM/exploits/t666.c

  4. Dacier, M., Deswarte, Y.: Privilege Graph: An Extension to the Typed Access Matrix Model. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 317–334. Springer, Heidelberg (1994)

    Google Scholar 

  5. Dacier, M., Deswarte, Y., Kaniche, M.: Models and tools for quantitative assessment of operational security. In: Proceedings IFIP SEC, pp. 177–186 (1996)

    Google Scholar 

  6. Jha, S., Sheyner, O., Wing, J.M.: Minimization and Reliability Analyses of Attack Graphs. Technical Report CMU-CS-02-109, School of Computer Science, Carnegie Mellon University (February 2002)

    Google Scholar 

  7. Jha, S., Sheyner, O., Wing, J.M.: Two Formal Analyses of Attack Graphs. In: Proceedings of the 2002 Computer Security Foundations Workshop, Nova Scotia, Canada, June 2002, pp. 45–59 (2002)

    Google Scholar 

  8. Ortalo, R., Deswarte, Y., Kaaniche, M.: Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security. IEEE Transactions on Software Engineering 25(5), 633–650 (1999)

    Article  Google Scholar 

  9. Phillips, C., Painton Swiler, L.: A Graph-Based System for Network-Vulnerability Analysis. In: Proceedings of the 1998 workshop on New Security Paradigms, pp. 71–79. ACM Press, Charlottesville (1998)

    Chapter  Google Scholar 

  10. Ramakrishnan, C.R., Sekar, R.: Model-based Vulnerability Analysis of Computer Systems. In: Proceedings of the 2nd International Workshop on Verification, Model Checking and Abstract Interpretation (September 1998)

    Google Scholar 

  11. Ramakrishnan, C.R., Sekar, R.: Model-Based Analysis of Configuration Vulnerabilities. Journal of Computer Security 10(1-2), 189–209 (2002)

    Google Scholar 

  12. Ramsdell, J.: Penetration Analysis Application. The MITRE Corporation (April 2001)

    Google Scholar 

  13. Ritchey, R., O’Berry, B., Noel, S.: Representing TCP/IP Connectivity for Topological Analysis of Network Security. In: 18th Annual Computer Security Applications Conference (December 2002)

    Google Scholar 

  14. Ritchey, R.W., Ammann, P.: Using Model Checking to Analyze Network Vulnerabilities. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 156–165 (2000)

    Google Scholar 

  15. Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.M.: Automated Generation and Analysis of Attack Graphs. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 254–265. IEEE Computer Society, Los Alamitos (2002)

    Google Scholar 

  16. Sheyner, O., Wing, J.: Tools for Generating and Analyzing Attack Graphs. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2003. LNCS, vol. 3188, pp. 344–371. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  17. Swiler, L.P., Phillips, C., Ellis, D., Chakerian, S.: Computer-Attack Graph Generation Tool. In: Proceedings DISCEX 2001: DARPA Information Survivability Conference and Exposition II, June 2001, pp. 307–321 (2001)

    Google Scholar 

  18. Templeton, S.J., Levitt, K.: A Requires/Provides Model for Computer Attacks. In: Proceedings of the New Security Paradigms Workshop, Ballycotton, County Cork, Ireland, pp. 31–38. ACM Press, New York (2000)

    Chapter  Google Scholar 

  19. US-CERT: Vulnerability Note Number: 16532—BIND NXT record processing may cause buffer overflow, http://www.kb.cert.org/vuls/id/16532

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Swarup, V., Jajodia, S., Pamula, J. (2005). Rule-Based Topological Vulnerability Analysis. In: Gorodetsky, V., Kotenko, I., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2005. Lecture Notes in Computer Science, vol 3685. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11560326_3

Download citation

  • DOI: https://doi.org/10.1007/11560326_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29113-8

  • Online ISBN: 978-3-540-31998-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics