• DocumentCode
    2270883
  • Title

    Vulnerability Modelling for the Analysis of Network Attacks

  • Author

    Maggi, Paolo ; Pozza, Davide ; Sisto, Riccardo

  • Author_Institution
    Dip. di Autom. e Inf., Politec. di Torino, Turin
  • fYear
    2008
  • fDate
    26-28 June 2008
  • Firstpage
    15
  • Lastpage
    22
  • Abstract
    In order to perform a successful attack on a network, an intruder must know various penetration techniques, also known as exploits. In general, an exploit can be successful only if some pre-conditions are true. Such conditions may involve the presence of vulnerable programs and/or specific software configurations, as well as certain attacker privileges on hosts and network reachability. When an exploit has success, it usually induces a new set of conditions within the network (post-conditions), such as new attacker privileges, and increased connectivity. Therefore, a network attack can be made of a series of exploits that gradually increase the attacker "power" on the network, until some final goal has been reached or the whole network has been compromised. Reaching such a goal is possible because of dependencies among exploits in terms of pre- and post-conditions. This paper describes how the OVAL language, originally aimed at describing how to check for the existence of vulnerabilities on hosts, can be enhanced to allow automatic reasoning for precisely determining the possible chains of exploits that an attacker could use to compromise the hosts in the network. Moreover, the paper shows how the description of vulnerabilities can be enriched to allow performing risk analysis, so as to determine the impact of attackers on the network, as well as the likelihood of attacks.
  • Keywords
    security of data; software engineering; network attacks analysis; risk analysis; software configurations; vulnerability modelling; Computer networks; Data security; Databases; Information security; Manuals; National security; Network topology; Performance analysis; Risk analysis; Tree graphs;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Dependability of Computer Systems, 2008. DepCos-RELCOMEX '08. Third International Conference on
  • Conference_Location
    Szklarska Poreba
  • Print_ISBN
    978-0-7695-3179-3
  • Type

    conf

  • DOI
    10.1109/DepCoS-RELCOMEX.2008.49
  • Filename
    4573035