Tool-Based Attack Graph Estimation and Scenario Analysis for Software Architectures

被引:0
作者
Walter, Maximilian [1 ]
Reussner, Ralf [1 ]
机构
[1] Karlsruhe Inst Technol KIT, KASTEL Inst Informat Secur & Dependabil, Karlsruhe, Germany
来源
SOFTWARE ARCHITECTURE. ECSA 2022 TRACKS AND WORKSHOPS | 2023年 / 13928卷
关键词
Attack Propagation; Software Architecture; Security;
D O I
10.1007/978-3-031-36889-9_5
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the increase of connected systems and the ongoing digitalization of various aspects of our life, the security demands for software increase. Software architects should design a secure and resistant system. One solution can be the identification of attack paths or the usage of an access control policy analysis. However, due to the system complexity identifying an attack path or analyzing access control policies is hard. Current attack path calculation approaches, often only focus on the network topology and do not consider the more fine-grained information a software architecture can provide, such as the components or deployment. In addition, the impact of access control policies for a given scenario is unclear. We developed an open-source attack propagation tool, which can calculate an attack graph based on the software architecture. This tool could help software architects to identify potential critical attack paths. Additionally, we extended the used access control metamodel to support a scenario-based access control analysis.
引用
收藏
页码:45 / 61
页数:17
相关论文
共 44 条
  • [1] Methods and Tools for Policy Analysis
    Abu Jabal, Amani
    Davari, Maryam
    Bertino, Elisa
    Makaya, Christian
    Calo, Seraphin
    Verma, Dinesh
    Russo, Alessandra
    Williams, Christopher
    [J]. ACM COMPUTING SURVEYS, 2019, 51 (06)
  • [2] Modeling of Dynamic Trust Contracts for Industry 4.0 Systems
    Al-Ali, Rima
    Heinrich, Robert
    Hnetynka, Petr
    Juan-Verdejo, Adrian
    Seifermann, Stephan
    Walter, Maximilian
    [J]. ECSA 2018: PROCEEDINGS OF THE 12TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE: COMPANION PROCEEDINGS, 2018,
  • [3] Alberti F., 2011, ACM ASIACCS, P165, DOI DOI 10.1145/1966913.1966935
  • [4] Automated analysis of security-design models
    Basin, David
    Clavel, Manuel
    Doser, Juergen
    Egea, Marina
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (05) : 815 - 831
  • [5] BloodHound Enterprise, About us
  • [6] Caldiera V. R. B. G., 1994, Encyclopedia of software engineering, P528
  • [7] Cole E., 2012, Newnes
  • [8] Modelling contexts in the Or-BAC model
    Cuppens, F
    Miège, A
    [J]. 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 416 - 425
  • [9] CVSS SIG, About us
  • [10] Deloglos C, 2020, LECT NOTES COMPUT SC, V12234, P150, DOI 10.1007/978-3-030-54549-9_10