A novel approach for analysis of attack graph
2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI)
https://doi.org/10.1109/ISI.2017.8004866Abstract
Attack graph technique is a common tool for the evaluation of network security. However, attack graphs are generally too large and complex to be understood and interpreted by security administrators. This paper proposes an analysis framework for security attack graphs for a given IT infrastructure system. First, in order to facilitate the discovery of interconnectivities among vulnerabilities in a network, multi-host multi-stage vulnerability analysis (MulVAL) is employed to generate an attack graph for a given network topology. Then a novel algorithm is applied to refine the attack graph and generate a simplified graph called a transition graph. Next, a Markov model is used to project the future security posture of the system. Finally, the framework is evaluated by applying it on a typical IT network scenario with specific services, network configurations, and vulnerabilities.
References (42)
- "execCode(citrixServer,user)","OR",0
- "RULE 3 (remote exploit for a client program)","AND",0
- "RULE 22 (Browsing a malicious website)","AND",0 5,"attackerLocated(internet)","LEAF",1
- "hacl(citrixServer,internet,httpProtocol,httpPort)","LEAF",1
- 9,"vulExists(citrixServer,'CVE-2010- 0490',ie,remoteClient,privEscalation)","LEAF",1
- "execCode(commServer,user)","OR",0
- "RULE 3 (remote exploit for a client program)","AND",0 12,"accessMaliciousInput(commServer,victim_1,windows_2000)","OR",0 13,"RULE 22 (Browsing a malicious website)","AND",0 14,"hacl(commServer,internet,httpProtocol,httpPort)","LEAF",1 15,"inCompetent(victim_1)","LEAF",1
- "hasAccount(victim_1,commServer,user)","LEAF",1 17,"vulExists(commServer,'CVE-2010- 0483',windows_2000,remoteClient,privEscalation)","LEAF",1
- "execCode(dataHistorian,root)","OR",0
- "RULE 2 (remote exploit of a server program)","AND",0 20,"netAccess(dataHistorian,httpProtocol,httpPort)","OR",0 21,"RULE 5 (multi-hop access)","AND",0
- "vulExists(dataHistorian,'CVE-2010- 0494',mountd,remoteExploit,privEscalation)","LEAF",1 25,"execCode(vpnServer,user)","OR",0
- "RULE 3 (remote exploit for a client program)","AND",0 27,"accessMaliciousInput(vpnServer,victim_5,openvpn)","OR",0 28,"RULE 22 (Browsing a malicious website)","AND",0
- "hacl(vpnServer,internet,httpProtocol,httpPort)","LEAF",1 30,"inCompetent(victim_5)","LEAF",1
- "hasAccount(victim_5,vpnServer,user)","LEAF",1 32,"vulExists(vpnServer,'CVE-2010-0492',openvpn,remoteClient, privEscalation)","LEAF",1 REFERENCES
- X. Ou and A. Singhal, Quantitative security risk assessment of enterprise networks, 1st ed. New York: Springer, 2012.
- Ou, X., Boyer, W. F., & McQueen, M. A. (2006, October). A scalable approach to attack graph generation. In Proceedings of the 13th ACM conference on Computer and communications security (pp. 336-345). ACM.
- Ou, X., Govindavajhala, S., & Appel, A. W. (2005, July). MulVAL: A Logic-based Network Security Analyzer. In USENIX security.
- Abraham, S., & Nair, S. (2015). A predictive framework for cyber security analytics using attack graphs. arXiv preprint arXiv:1502.01240.
- Kissel, R. (Ed.). (2011). Glossary of key information security terms. Diane Publishing.
- Ferraiolo, K. (2000). The Systems Security Engineering Capability Maturity Model.
- Stoneburner, G., Hayden, C., & Feringa, A. (2001). Engineering principles for information technology security (a baseline for achieving security). BOOZ-ALLEN AND HAMILTON INC MCLEAN VA.
- Grance, T., Hash, J., Stevens, M., O'Neal, K., & Bartol, N. (2003). SP 800-35. Guide to Information Technology Security Services.
- Dawkins, J., & Hale, J. (2004, April). A systematic approach to multi- stage network attack analysis. In Information Assurance Workshop, 2004. Proceedings. Second IEEE International (pp. 48-56). IEEE.
- Dewri, R., Poolsappasit, N., Ray, I., & Whitley, D. (2007, October). Optimal security hardening using multi-objective optimization on attack tree models of networks. In Proceedings of the 14th ACM conference on Computer and communications security (pp. 204-213). ACM.
- Homer, J., Zhang, S., Ou, X., Schmidt, D., Du, Y., Rajagopalan, S. R., & Singhal, A. (2013). Aggregating vulnerability metrics in enterprise networks using attack graphs. Journal of Computer Security, 21(4), 561- 597.
- Ingols, K., Lippmann, R., & Piwowarski, K. (2006, December). Practical attack graph generation for network defense. In Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual (pp. 121-130). IEEE.
- Jajodia, S., & Noel, S. (2010). Advanced cyber attack modeling analysis and visualization. GEORGE MASON UNIV FAIRFAX VA.
- Jajodia, S., Noel, S., & O'Berry, B. (2005). Topological analysis of network attack vulnerability. In Managing Cyber Threats (pp. 247-266). Springer US.
- Li, W., Vaughn, R. B., & Dandass, Y. S. (2006). An approach to model network exploitations using exploitation graphs. Simulation, 82(8), 523- 541.
- Lippmann, R. P., & Ingols, K. W. (2005). An annotated review of past papers on attack graphs (No. PR-IA-1). MASSACHUSETTS INST OF TECH LEXINGTON LINCOLN LAB.
- Saha, D. (2008, October). Extending logical attack graphs for efficient vulnerability analysis. In Proceedings of the 15th ACM conference on Computer and communications security (pp. 63-74). ACM.
- Sheyner, O., Haines, J., Jha, S., Lippmann, R., & Wing, J. M. (2002). Automated generation and analysis of attack graphs. In Security and privacy, 2002. Proceedings. 2002 IEEE Symposium on (pp. 273-284). IEEE.
- Jajodia, S., & Noel, S. (2010). Topological vulnerability analysis. In Cyber situational awareness (pp. 139-154). Springer US.
- Ritchey, R. W., & Ammann, P. (2000). Using model checking to analyze network vulnerabilities. In Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on (pp. 156-165). IEEE.
- Ammann, P., Wijesekera, D., & Kaushik, S. (2002, November). Scalable, graph-based network vulnerability analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security (pp. 217-224). ACM.
- Lippmann, R., Ingols, K., Scott, C., Piwowarski, K., Kratkiewicz, K., Artz, M., & Cunningham, R. (2006, October). Validating and restoring defense in depth using attack graphs. In Military Communications Conference, 2006. MILCOM 2006. IEEE (pp. 1-10). IEEE.
- Noel, S., & Jajodia, S. (2005, December). Understanding complex network attack graphs through clustered adjacency matrices. In Computer Security Applications Conference, 21st Annual (pp. 10-pp). IEEE.
- Homer, J., Varikuti, A., Ou, X., & McQueen, M. (2008). Improving attack graph visualization through data reduction and attack grouping. Visualization for computer security, 68-79.
- Huang, H., Zhang, S., Ou, X., Prakash, A., & Sakallah, K. (2011, December). Distilling critical attack graph surface iteratively through minimum-cost sat solving. In Proceedings of the 27th Annual Computer Security Applications Conference (pp. 31-40). ACM.
- Lippmann, R. P., Ingols, K. W., Scott, C., Piwowarski, K., Kratkiewicz, K., Artz, M., & Cunningham, R. (2005). Evaluating and strengthening enterprise network security using attack graphs. Lexington, Massachusetts October.
- Noel, Steven, and Sushil Jajodia. "Managing attack graph complexity through visual hierarchical aggregation." Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security. ACM, 2004.
- Williams, L., Lippmann, R., & Ingols, K. (2008). An interactive attack graph cascade and reachability display. In VizSEC 2007 (pp. 221-236). Springer Berlin Heidelberg.