DocumentCode :
2172936
Title :
On the completeness of attack mutation algorithms
Author :
Rubin, Shai ; Jha, Somesh ; Miller, Barton P.
Author_Institution :
Dept. of Comput. Sci., Wisconsin Univ., Madison, WI
fYear :
0
fDate :
0-0 0
Lastpage :
56
Abstract :
An attack mutation algorithm takes a known instance of an attack and transforms it into many distinct instances by repeatedly applying attack transformations. Such algorithms are widely used for testing intrusion detection systems. We investigate the notion of completeness of a mutation algorithm: its capability to generate all possible attack instances from a given set of attack transformations. We define the notion of a Phi-complete mutation algorithm. Given a set of transformations Phi, an algorithm is complete with respect to Phi, if it can generate every instance that the transformations in Phi derive. We show that if the rules in Phi are uniform and reversible then a Phi-complete algorithm exists. Intuitively speaking, uniform and reversible transformations mean that we can first exclusively apply transformations that simplify the attack, then exclusively apply transformations that complicate it, and still get all possible instances that are derived by the rules in Phi. Although uniformity and reversibility may appear severe restrictions, we show that common attack transformations are indeed uniform and reversible. Therefore, our Phi-complete algorithm can be incorporated into existing testing tools for intrusion detection systems. Furthermore, we show that a Phi-complete algorithm is useful, not only for testing purposes, but also for determining whether two packet traces are two different mutations of the same attack
Keywords :
security of data; Phi-complete mutation algorithm; attack mutation algorithms; attack transformations; intrusion detection systems; reversible transformations; transformations Phi; uniform transformations; Computer security; Conferences; Encoding; Feeds; Genetic mutations; Intrusion detection; Pattern matching; System testing; TCPIP; Uniform resource locators;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Workshop, 2006. 19th IEEE
Conference_Location :
Venice
ISSN :
1063-6900
Print_ISBN :
0-7695-2615-2
Type :
conf
DOI :
10.1109/CSFW.2006.21
Filename :
1648707
Link To Document :
بازگشت