A quantitative model of the security intrusion process based on attacker behavior

被引:143
作者
Jonsson, E [1 ]
Olovsson, T [1 ]
机构
[1] CARLSTEDT RES & TECHNOL,S-41112 GOTHENBURG,SWEDEN
关键词
computer security; modeling; metric; intrusion; attacks; operational security;
D O I
10.1109/32.588541
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper is based on a conceptual framework in which security can be split into two generic types of characteristics, behavioral and preventive. Here, preventive security denotes the system's ability to protect itself from external attacks. One way to describe the preventive security of a system is in terms of its interaction,with the alleged attacker, i.e., by describing the intrusion process. To our knowledge, very little is done to model this process in quantitative terms. Therefore, based on empirical data collected from intrusion experiments, we have worked out a hypothesis on typical attacker behavior. The hypothesis suggests that the attacking process can be split into three phases: the learning phase, the standard at tack phase, and the innovative attack phase. The probability for successful attacks during the learning and innovative phases is expected to be small, although for different reasons. During the standard attack phase it is expected to be considerably higher. The collected data indicates that the breaches during the standard attack phase are statistically equivalent and that the times between breaches are exponentially distributed. This would actually imply that traditional methods for reliability modeling could be applicable.
引用
收藏
页码:235 / 245
页数:11
相关论文
共 18 条
[1]   PENETRATING AN OPERATING SYSTEM - STUDY OF VM-370 INTEGRITY [J].
ATTANASIO, CR ;
MARKSTEIN, PW ;
PHILLIPS, RJ .
IBM SYSTEMS JOURNAL, 1976, 15 (01) :102-116
[2]  
BROCKLEHURST S, 1994, P 9 ANN IEEE C COMP, P257
[3]  
DENNING DE, 1987, IEEE T SOFTWARE ENG, V12, P222
[4]  
GOLDIS PD, 1989, ED PACS EDP AUDIT CO, V27, P1
[5]  
Gustafson U, 1996, LECT NOTES COMPUT SC, V1172, P242, DOI 10.1007/BFb0023303
[6]  
GUSTAFSON U, 1996, P 14 INT C COMP COMM, P187
[7]  
HERSCHBERGIS, 1988, COMPUTERS SECURITY, V7, P197
[8]  
*INF TECHN SEC EV, 1993, PROV HARM CRIT
[9]  
Jonsson E, 1996, LECT NOTES COMPUT SC, V1172, P228, DOI 10.1007/BFb0023302
[10]  
Jonsson E, 1996, COMPASS '96 - PROCEEDINGS OF THE ELEVENTH ANNUAL CONFERENCE ON COMPUTER ASSURANCE, P176, DOI 10.1109/CMPASS.1996.507886