DocumentCode :
2858032
Title :
A host-based approach to network attack chaining analysis
Author :
Ammann, Paul ; Pamula, Joseph ; Ritchey, Ronald ; Street, Julie
Author_Institution :
ISE Dept., George Mason Univ., Fairfax, VA
fYear :
2005
fDate :
5-9 Dec. 2005
Lastpage :
84
Abstract :
The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a chain is called an attack path, and the set of all possible attack paths form an attack graph. Researchers have proposed a variety of methods to generate attack graphs. In this paper, we provide a novel alternative approach to network vulnerability analysis by utilizing a penetration tester\´s perspective of maximal level of penetration possible on a host. Our approach has the following benefits: it provides a more intuitive model in which an analyst can work, and its algorithmic complexity is polynomial in the size of the network, and so has the potential of scaling well to practical networks. The drawback is that we track only "good" attack paths, as opposed to all possible attack paths. Hence, an analyst may make suboptimal choices when repairing the network. Since attack graphs grow exponentially with the size of the network, we argue that suboptimal solutions are an unavoidable cost of scalability, and hence practical utility. A working prototype tool has been implemented to demonstrate the practicality of our approach
Keywords :
computer networks; security of data; telecommunication security; algorithmic complexity; attack graph; attack path; attack penetration tester; intuitive model; network attack chaining analysis; network vulnerability analysis; Algorithm design and analysis; Automatic testing; Costs; Displays; Information systems; Polynomials; Potential well; Prototypes; Retina; Scalability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 21st Annual
Conference_Location :
Tucson, AZ
ISSN :
1063-9527
Print_ISBN :
0-7695-2461-3
Type :
conf
DOI :
10.1109/CSAC.2005.6
Filename :
1565236
Link To Document :
بازگشت