首页> 外文会议>IEEE Computer Security Foundations Workshop >Two formal analyses of attack graphs
【24h】

Two formal analyses of attack graphs

机译:攻击图的两个正式分析

获取原文
获取外文期刊封面目录资料

摘要

An attack graph is a succinct representation of all paths through a system that end in a state where an intruder has successfully achieved his goal. Today Red Teams determine the vulnerability of networked systems by drawing gigantic attack graphs by hand. Constructing attack graphs by hand is tedious, error-prone, and impractical for large systems. By viewing an attack as a violation of a safety property, we can use off-the-shelf model checking technology to produce attack graphs automatically: a successful path from the intruder's viewpoint is a counterexample produced by the model checker. In this paper we present an algorithm for generating attack graphs using model checking as a subroutine. Security analysts use attack graphs for detection, defense and forensics. In this paper we present a minimization analysis technique that allows analysts to decide which minimal set of security measures would guarantee the safety of the system. We provide a formal characterization of this problem: we prove that it is polynomially equivalent to the minimum hitting set problem and we present a greedy algorithm with provable bounds. We also present a reliability analysis technique that allows analysts to perform a simple cost-benefit trade-off-depending on the likelihoods of attacks. By interpreting attack graphs as Markov Decision Processes we can use the value iteration algorithm to compute the probabilities of intruder success for each attack the graph.
机译:攻击图是通过在入侵者成功实现目标的状态的状态结束的系统的简洁表示。今天,红色团队通过手工绘制巨大攻击图来确定网络系统的脆弱性。用手构建攻击图是繁琐的,容易出错,并且对于大型系统不切实际。通过查看攻击作为违反安全性质的攻击,我们可以使用现成的模型检查技术自动产生攻击图:入侵者视点的成功路径是模型检查器产生的反例。在本文中,我们介绍了一种使用模型检查作为子程序生成攻击图的算法。安全分析师使用攻击图进行检测,防御和取证。在本文中,我们提出了一种最小化分析技术,允许分析师决定哪种最小的安全措施能够保证系统的安全。我们提供了这个问题的正式表征:我们证明它是多项式相当于最小击中设定问题,我们呈现了一种具有可证实范围的贪婪算法。我们还提出了一种可靠性分析技术,允许分析师执行简单的成本效益折衷 - 取决于攻击的可能性。通过将攻击图解释为Markov决策过程,我们可以使用价值迭代算法来计算每个攻击图形的入侵者成功的概率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号