Implementing interactive analysis of attack graphs using relational databases

被引:14
作者
Wang, Lingyu [1 ]
Yao, Chao [2 ]
Singhal, Anoop [3 ]
Jajodia, Sushil [4 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn, Montreal, PQ H3G 1M8, Canada
[2] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
[3] NIST, Comp Secur Div, Gaithersburg, MD 20899 USA
[4] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
基金
加拿大自然科学与工程研究理事会; 美国国家科学基金会;
关键词
D O I
10.3233/JCS-2008-0327
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An attack graph models the causal relationships between vulnerabilities. Attack graphs have important applications in protecting critical resources in networks against sophisticated multi-step intrusions. Currently, analyses of attack graphs largely depend on proprietary implementations of specialized algorithms. However, developing and implementing algorithms causes a delay to the availability of new analyses. The delay is usually unacceptable due to rapidly-changing needs in defending against network intrusions. An administrator may want to revise an analysis as soon as its outcome is observed. Such an interactive analysis, similar to that in decision support systems, is desirable but difficult with current approaches based on proprietary implementations of algorithms. This paper addresses the above issue through a relational approach. Specifically, we devise a relational model for representing necessary inputs, such as network configurations and domain knowledge, and we generate attack graphs from these inputs as relational views. We show that typical analyses can be supported through different type of searches in an attack graph, and these searches can be realized as relational queries. Our approach eliminates the needs for implementing algorithms, because an analysis is now simply a relational query. The interactive analysis of attack graphs becomes possible, since relational queries can be dynamically constructed and revised at run time. As a side effect, experimental results show that the mature optimization techniques in relational databases can transparently improve the performance of the analysis.
引用
收藏
页码:419 / 437
页数:19
相关论文
共 20 条
[1]  
Agrawal R., 2003, P 19 INT C DAT ENG I
[2]  
Ammann P., 2002, P 9 ACM C COMPUTER C, P217, DOI DOI 10.1145/586110.586140
[3]  
Cuppens F, 2002, P IEEE S SECUR PRIV, P202, DOI 10.1109/SECPRI.2002.1004372
[4]  
JAJODIA S, 2003, MANAGING CYBER THREA
[5]  
Ning P., 2002, P 9 ACM C COMP COMM, P245
[6]  
NOEL S, 2004, P 20 ANN COMP SEC AP
[7]  
Noel S., 2003, P 19 ANN COMP SEC AP
[8]  
Ramakrishnan C. R., 2002, Journal of Computer Security, V10, P189
[9]   Using model checking to analyze network vulnerabilities [J].
Ritchey, RW ;
Ammann, P .
2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, :156-165
[10]   Automated generation and analysis of attack graphs [J].
Sheyner, O ;
Haines, J ;
Jha, S ;
Lippmann, R ;
Wing, JM .
2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, :273-284