Architecture-Based Attack Path Analysis for Identifying Potential Security Incidents

被引:3
作者
Walter, Maximilian [1 ]
Heinrich, Robert [1 ]
Reussner, Ralf [1 ]
机构
[1] Karlsruhe Inst Technol KIT, KASTEL Inst Informat Secur & Dependabil, Karlsruhe, Germany
来源
SOFTWARE ARCHITECTURE, ECSA 2023 | 2023年 / 14212卷
关键词
Attack Propagation; Software Architecture; Attack Path;
D O I
10.1007/978-3-031-42592-9_3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Analyzing attacks and potential attack paths can help to identify and avoid potential security incidents. Manually estimating an attack path to a targeted software element can be complex since a software system consists of multiple vulnerable elements, such as components, hardware resources, or network elements. In addition, the elements are protected by access control. Software architecture describes the structural elements of the system, which may form elements of the attack path. However, estimating attack paths is complex since different attack paths can lead to a targeted element. Additionally, not all attack paths might be relevant since attack paths can have different properties based on the attacker's capabilities and knowledge. We developed an approach that enables architects to identify relevant attack paths based on the software architecture. We created a metamodel for filtering options and added support for describing attack paths in an architectural description language. Based on this metamodel, we developed an analysis that automatically estimates attack paths using the software architecture. This can help architects to identify relevant attack paths to a targeted component and increase the system's overall security. We evaluated our approach on five different scenarios. Our evaluation goals are to investigate our analysis's accuracy and scalability. The results suggest a high accuracy and good runtime behavior for smaller architectures.
引用
收藏
页码:37 / 53
页数:17
相关论文
共 35 条
[11]  
Fisler K, 2005, PROC INT CONF SOFTW, P196
[12]  
Hamilton B.A, Tech. rep., P82
[13]   Architecture-based change impact analysis in cross-disciplinary automated production systems [J].
Heinrich, Robert ;
Koch, Sandro ;
Cha, Suhyun ;
Busch, Kiana ;
Reussner, Ralf ;
Vogel-Heuser, Birgit .
JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 146 :167-185
[14]  
Johns E, 2021, Technical Report
[15]  
Jurjens J., 2002, "UML" 2002 - Unified Modeling Language. Model Engineering, Concepts, and Tools. 5th International Conference. Proceedings (Lecture Notes in Computer Science Vol.2460), P412
[16]   Automatic Derivation of Vulnerability Models for Software Architectures [J].
Kirschner, Yves R. ;
Walter, Maximilian ;
Bossert, Florian ;
Heinrich, Robert ;
Koziolek, Anne .
2023 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE COMPANION, ICSA-C, 2023, :276-283
[17]   DAG-based attack and defense modeling: Don't miss the forest for the attack trees [J].
Kordy, Barbara ;
Pietre-Cambacedes, Ludovic ;
Schweitzer, Patrick .
COMPUTER SCIENCE REVIEW, 2014, 13-14 :1-38
[18]  
Lodderstedt Torsten, 2002, P INT C UN MOD LANG, P426
[19]  
owasp, OWASP Top Ten Web Application Security Risks-OWASP
[20]  
Plachkinova M., 2018, Journal of Information Systems Education, V29, P11