DocumentCode :
621530
Title :
Efficient generation of exploit dependency graph by customized attack modeling technique
Author :
Chokshi, Ishan ; Ghosh, Nirnay ; Ghosh, Soumya K.
Author_Institution :
Sch. of Inf. Technol., Indian Inst. of Technol., Kharagpur, Kharagpur, India
fYear :
2012
fDate :
14-16 Dec. 2012
Firstpage :
39
Lastpage :
45
Abstract :
A major challenge in today´s network is to maintain a secure interconnected world of computing where confidentiality, integrity, availability of information and resources are restored. Traditionally, security is enforced by access control and authentication. However, these security best practices do not take operating system, or network service-based vulnerabilities into account. With the evolution of sophisticated hacking tools, attackers exploit these vulnerabilities and gain legitimate access to network resources, bypassing the access control and authentication policies. Exploit dependency graph models service or application-based attacks and depicts all possible multi-host multi-step attack scenarios that an attacker can launch to penetrate into a network. An important step in the generation of exploit dependency graph is to characterize exploits in terms of a set of precondition and postcondition. Most of the reported works have generated exploit dependency graphs using proprietary vulnerability databases not available in the public domain. This work proposes a customized exploit dependency graph generation through modeling of exploits from open-source databases. Analysis of the developed algorithm shows considerable improvement in terms of time and space complexity in comparison to the reported works.
Keywords :
computational complexity; computer network security; data integrity; graph theory; public domain software; application-based attacks; authentication policies; customized attack modeling technique; customized exploit dependency graph generation; exploit dependency graph model service; hacking tools; information availability; information confidentiality; information integrity; legitimate access control; multihost multistep attack scenarios; network resources; open-source databases; postcondition set; precondition set; proprietary vulnerability databases; resource availability; resource confidentiality; resource integrity; space complexity; time complexity; Availability; Data structures; Databases; Internet; Peer-to-peer computing; Security; Servers; Access policy; Attack graph; Domain; Exploit; Fact; Vulnerability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Computing and Communications (ADCOM), 2012 18th Annual International Conference on
Conference_Location :
Bangalore
Print_ISBN :
978-1-4799-0802-8
Type :
conf
DOI :
10.1109/ADCOM.2012.6563582
Filename :
6563582
Link To Document :
بازگشت