DocumentCode
2270883
Title
Vulnerability Modelling for the Analysis of Network Attacks
Author
Maggi, Paolo ; Pozza, Davide ; Sisto, Riccardo
Author_Institution
Dip. di Autom. e Inf., Politec. di Torino, Turin
fYear
2008
fDate
26-28 June 2008
Firstpage
15
Lastpage
22
Abstract
In order to perform a successful attack on a network, an intruder must know various penetration techniques, also known as exploits. In general, an exploit can be successful only if some pre-conditions are true. Such conditions may involve the presence of vulnerable programs and/or specific software configurations, as well as certain attacker privileges on hosts and network reachability. When an exploit has success, it usually induces a new set of conditions within the network (post-conditions), such as new attacker privileges, and increased connectivity. Therefore, a network attack can be made of a series of exploits that gradually increase the attacker "power" on the network, until some final goal has been reached or the whole network has been compromised. Reaching such a goal is possible because of dependencies among exploits in terms of pre- and post-conditions. This paper describes how the OVAL language, originally aimed at describing how to check for the existence of vulnerabilities on hosts, can be enhanced to allow automatic reasoning for precisely determining the possible chains of exploits that an attacker could use to compromise the hosts in the network. Moreover, the paper shows how the description of vulnerabilities can be enriched to allow performing risk analysis, so as to determine the impact of attackers on the network, as well as the likelihood of attacks.
Keywords
security of data; software engineering; network attacks analysis; risk analysis; software configurations; vulnerability modelling; Computer networks; Data security; Databases; Information security; Manuals; National security; Network topology; Performance analysis; Risk analysis; Tree graphs;
fLanguage
English
Publisher
ieee
Conference_Titel
Dependability of Computer Systems, 2008. DepCos-RELCOMEX '08. Third International Conference on
Conference_Location
Szklarska Poreba
Print_ISBN
978-0-7695-3179-3
Type
conf
DOI
10.1109/DepCoS-RELCOMEX.2008.49
Filename
4573035
Link To Document