Modeling Modern Network Attacks and Countermeasures Using Attack Graphs

被引:105
作者
Ingols, Kyle [1 ]
Chu, Matthew [1 ]
Lippmann, Richard [1 ]
Webster, Seth [1 ]
Boyer, Stephen [1 ]
机构
[1] MIT Lincoln Lab, Lexington, MA 02420 USA
来源
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE | 2009年
关键词
D O I
10.1109/ACSAC.2009.21
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective countermeasures. This paper describes substantial enhancements to the NetSPA attack graph system required to model additional present-day threats (zero-day exploits and client-side attacks) and countermeasures (intrusion prevention systems, proxy firewalls, personal firewalls, and host-based vulnerability scans). Point-to-point reachability algorithms and structures were extensively redesigned to support "reverse" reachability computations and personal firewalls. Host-based vulnerability scans are imported and analyzed. Analysis of an operational network with 85 hosts demonstrates that client-side attacks pose a serious threat. Experiments on larger simulated networks demonstrated that NetSPA's previous excellent scaling is maintained. Less than two minutes are required to completely analyze a four-enclave simulated network with more than 40,000 hosts protected by personal firewalls.
引用
收藏
页码:117 / 126
页数:10
相关论文
共 27 条
  • [1] [Anonymous], 2005, ANNOTATED REV PAPERS
  • [2] [Anonymous], NESSUS SECURITY SCAN
  • [3] [Anonymous], BuDDy, a binary decision diagram package
  • [4] [Anonymous], UCAMCLTR746
  • [5] Mission oriented risk and design analysis of critical information systems
    Buckshaw, DL
    Parnell, GS
    Unkenholz, WL
    Parks, DL
    Wallner, JM
    Saydjari, OS
    [J]. MILITARY OPERATIONS RESEARCH, 2005, 10 (02) : 19 - 38
  • [6] *IBM GLOB TECHN SE, 2009, IBM INT SEC SYST X F
  • [7] Practical attack graph generation for network defense
    Ingols, Kyle
    Lippmann, Richard
    Piwowarski, Keith
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 121 - +
  • [8] JAJODIA S, 2003, TOPOLOGICAL ANAL NET, pCH5
  • [9] Khakpour A., 2009, MSUCSE092
  • [10] Lippmann R., 2006, IEEE MIL COMM C MILC