Architecture-Based Attack Path Analysis for Identifying Potential Security Incidents

被引:3
作者
Walter, Maximilian [1 ]
Heinrich, Robert [1 ]
Reussner, Ralf [1 ]
机构
[1] Karlsruhe Inst Technol KIT, KASTEL Inst Informat Secur & Dependabil, Karlsruhe, Germany
来源
SOFTWARE ARCHITECTURE, ECSA 2023 | 2023年 / 14212卷
关键词
Attack Propagation; Software Architecture; Attack Path;
D O I
10.1007/978-3-031-42592-9_3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Analyzing attacks and potential attack paths can help to identify and avoid potential security incidents. Manually estimating an attack path to a targeted software element can be complex since a software system consists of multiple vulnerable elements, such as components, hardware resources, or network elements. In addition, the elements are protected by access control. Software architecture describes the structural elements of the system, which may form elements of the attack path. However, estimating attack paths is complex since different attack paths can lead to a targeted element. Additionally, not all attack paths might be relevant since attack paths can have different properties based on the attacker's capabilities and knowledge. We developed an approach that enables architects to identify relevant attack paths based on the software architecture. We created a metamodel for filtering options and added support for describing attack paths in an architectural description language. Based on this metamodel, we developed an analysis that automatically estimates attack paths using the software architecture. This can help architects to identify relevant attack paths to a targeted component and increase the system's overall security. We evaluated our approach on five different scenarios. Our evaluation goals are to investigate our analysis's accuracy and scalability. The results suggest a high accuracy and good runtime behavior for smaller architectures.
引用
收藏
页码:37 / 53
页数:17
相关论文
共 35 条
[1]   Automated Generation of Attack Graphs Using NVD [J].
Aksu, M. Ugur ;
Bicakci, Kemal ;
Dilek, M. Hadi ;
Ozbayoglu, A. Murat ;
Tatli, E. Islam .
PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, :135-142
[2]   Threat Modeling for Cloud Data Center Infrastructures [J].
Alhebaishi, Nawaf ;
Wang, Lingyu ;
Jajodia, Sushil ;
Singhal, Anoop .
FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2016, 2017, 10128 :302-319
[3]  
[Anonymous], 1979, Information Retrieval
[4]  
[Anonymous], 2022, Securing the Software Supply Chain: Recommended Practices Guide for Developers, P64
[5]  
[Anonymous], 2018, ISO Standard
[6]  
Basili G, 1994, Encyclopedia of Software Engineering
[7]  
Berger Bernhard J., 2016, Engineering Secure Software and Systems. 8th International Symposium, ESSoS 2016. Proceedings: LNCS 9639, P56, DOI 10.1007/978-3-319-30806-7_4
[8]  
Common Weakness Enumeration (CWE), about us
[9]  
CVE, About us
[10]  
CVSS SIG, About us