Mapping evidence graphs to attack graphs
2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS)
Abstract
Attack graphs compute potential attack paths from a system configuration and known vulnerabilities of a system. Evidence graphs model intrusion evidence and dependencies among them for forensic analysis. In this paper, we show how to map evidence graphs to attack graphs. This mapping is useful for application of attack graphs and evidence graphs for forensic analysis. In addition to helping to refine attack graphs by comparing attack paths in both attack graphs and evidence graphs, important probabilistic information contained in evidence graphs can be used to compute or refine potential attack success probabilities contained in repositories like C VSS. Conversely, attack graphs can be used to add missing evidence or remove irrelevant evidence to build a complete evidence graph. In particular, when attackers use anti-forensics tools to destroy or distort evidence, attack graphs can help investigators recover the attack scenarios and explain the lack of evidence for missing steps. We illustrated the mapping using a database attack as a case study.
References (14)
- TightVNC Software, http://www.tightvnc.com/.
- L. Wang, T. Islam, T. Long, A. Singhal, and S. Jajodia. An attack graph- based probabilistic security metric. In Proceedings of The 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security '%6(& ¶
- C. Liu, A. Singhal ' :LMHVHNHUD ³8VLQJ $WWDFN *UDSKV LQ )RUHQVLF ([DPLQDWLRQV´ 6HYHQWK ,QWHUQDWLRQDO &RQIHUHQFH RQ $YDLODELOLW\ Reliability and Security, August 2012
- MulVAL V1.1, Jan 30, 2012, http://people.cis.ksu.edu/~xou/mulval/.
- T.H. Cormen, C.E. Leiserson, R.L. Rivest, C. Stein, Introduction to Algorithms, MIT University Press, Cambridge, 2001.
- A PP E N D I X 1. A ttack graph in F igure 1
- O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M.Wing. Automated generation and analysis of attack graphs. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, pages 254±265, 2002.
- >@ . ,QJROV 0 &KX 5 /LSSPDQQ 6 :HEVWHU DQG 6 %R\HU ³0RGHOLQJ 0RGHUQ 1HWZRUN $WWDFNV DQG &RXQWHUPHDVXUHV 8VLQJ $WWDFN *UDSKV´ Proceedings of ACSAC Conference 2009.
- >@ 6$16 ,QVWLWXWH ,QIR6HF 5HDGLQJ 5RRP ³DQ 2YHUYLHZ RI 'LVN ,PDJLQJ 7RROLQ&RPSXWHU)RUHQVLFV´
- >@ % &DUULHU ³)LOH 6\VWHP )RUHQVLF $QDO\VLV´ $GGLVRQ-Wesley Professional, March 2005.
- H. Debar, M. Becker, D. Siboni, A neural network component for an intrusion detection system, Proceedings of IEEE Symposium on Research in Computer Security and Privacy, 1992.
- >@ 6 -DMRGLD 6 1RHO %2 ¶%HUU\ ³7RSRORJLFDO $QDO\VLV RI 1HWZRUN
- $WWDFN 9XOQHUDELOLW\´ ,Q 0DQDJLQJ &\EHU 7KUHDWV ,ssues, Approaches and Challenges, V. Kumar, J. Srivastava, A. Lazarevic (eds.), Springer, 2005.
- W. G. Halfond, J. Viegas, and A. Orso. A Classification of SQL-Injection Attacks and Countermeasures. In Proc. Of the Intern. Symposium on Secure Software Engineering (ISSSE 2006), Mar. 2006.