【24h】

Ranking Attack Graphs

机译:排名攻击图

获取原文
获取原文并翻译 | 示例

摘要

A majority of attacks on computer systems result from a combination of vulnerabilities exploited by an intruder to break into the system. An Attack Graph is a general formalism used to model security vulnerabilities of a system and all possible sequences of exploits which an intruder can use to achieve a specific goal. Attack Graphs can be constructed automatically using off-the-shelf model-checking tools. However, for real systems, the size and complexity of Attack Graphs greatly exceeds human ability to visualize, understand and analyze. Therefore, it is useful to identify relevant portions of an Attack Graph. To achieve this, we propose a ranking scheme for the states of an Attack Graph. Rank of a state shows its importance based on factors like the probability of an intruder reaching that state. Given a Ranked Attack Graph, the system administrator can concentrate on relevant subgraphs to figure out how to start deploying security measures. We also define a metric of security of the system based on ranks which the system administrator can use to compare Attack Graphs and determine the effectiveness of various defense measures. We present two algorithms to rank states of an Attack Graph based on the probability of an attacker reaching those states. The first algorithm is similar to the PageRank algorithm used by Google to measure importance of web pages on the World Wide Web. It is flexible enough to model a variety of situations, efficiently computable for large sized graphs and offers the possibility of approximations using graph partitioning. The second algorithm ranks individual states based on the reachability probability of an attacker in a random simulation. Finally, we give examples of an application of ranking techniques to multi-stage cyber attacks.
机译:对计算机系统的大多数攻击是由入侵者利用各种漏洞组合侵入系统所致。攻击图是一种通用形式主义,用于对系统的安全漏洞以及入侵者可以用来实现特定目标的所有可能的利用序列进行建模。可以使用现成的模型检查工具自动构建攻击图。但是,对于实际系统,攻击图的大小和复杂性大大超出了人类可视化,理解和分析的能力。因此,识别攻击图的相关部分很有用。为此,我们提出了针对攻击图状态的排名方案。一个州的等级根据诸如入侵者到达该州的概率之类的因素显示其重要性。给定排名的攻击图,系统管理员可以专注于相关的子图,以弄清楚如何开始部署安全措施。我们还基于等级定义了系统安全性度量,系统管理员可以使用等级来比较攻击图并确定各种防御措施的有效性。我们提出了两种算法,可根据攻击者到达这些状态的概率来对攻击图的状态进行排名。第一种算法类似于Google用来衡量Internet上网页重要性的PageRank算法。它具有足够的灵活性来对各种情况进行建模,可以针对大型图形进行有效计算,并提供了使用图形分区进行近似的可能性。第二种算法根据攻击者在随机模拟中的可达性概率对各个状态进行排名。最后,我们给出了将分级技术应用于多阶段网络攻击的示例。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号