A Graphical Model to Assess the Impact of Multi-Step Attacks

被引:16
作者
Albanese, Massimiliano [1 ]
Jajodia, Sushil [1 ,2 ]
机构
[1] George Mason Univ, Dept Informat Sci & Technol, Fairfax, VA 22030 USA
[2] George Mason Univ, Ctr Secure Informat Syst, Volgenau Sch Engn, Fairfax, VA 22030 USA
来源
JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS | 2018年 / 15卷 / 01期
关键词
Attack graphs; dependency graphs; impact analysis;
D O I
10.1177/1548512917706043
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In the last several decades, networked systems have grown in complexity and sophistication, introducing complex interdependencies amongst their numerous and diverse components. Attackers can leverage such interdependencies to penetrate seemingly well-guarded networks through sophisticated multi-step attacks. Research has shown that explicit and implicit interdependencies exist at various layers of the hardware and software architecture. In particular, dependencies between vulnerabilities and dependencies between applications and services are critical for assessing the impact of multi-step attacks. These two classes of interdependencies have been traditionally studied using attack and dependency graphs respectively. Although significant work has been done in the area of both attack and dependency graphs, we demonstrate that neither of these models can provide an accurate assessment of an attack's impact, when used in isolation. To address this limitation, we take a mission-centric approach and present a solution to integrate these two powerful models into a unified framework that enables us to accurately assess the impact of multi-step attacks and identify high-impact attack paths within a network. This analysis can ultimately generate effective hardening recommendations, and can be seen as one phase of a continuous process that iteratively cycles through impact analysis and vulnerability remediation stages.
引用
收藏
页码:79 / 93
页数:15
相关论文
共 28 条
  • [1] Albanese M, P 16 EUR S RES COMP, P416
  • [2] Albanese M., 2014, ADV INFORM SECURITY, P47
  • [3] Albanese M, P 42 ANN IEEE IFIP I
  • [4] Albanese M, P 10 INT C SEC CRYPT, P207
  • [5] Albanese M., 2014, SECURE CLOUD COMPUTI, P239
  • [6] A Constrained Probabilistic Petri Net Framework for Human Activity Detection in Video
    Albanese, Massimiliano
    Chellappa, Rama
    Moscato, Vincenzo
    Picariello, Antonio
    Subrahmanian, V. S.
    Turaga, Pavan
    Udrea, Octavian
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2008, 10 (08) : 1429 - 1443
  • [7] Bahl PV, P 5 ACM WORKSH HOT T, P97
  • [8] Chen X., 2008, OSDI, V8, P117
  • [9] Dain O, P 2001 ACM WORKSH DA, P1
  • [10] Duong TV, 2005, PROC CVPR IEEE, P838