Risk management using behavior based attack graphs

被引:30
作者
Dantu, R [1 ]
Loper, K [1 ]
Kolan, P [1 ]
机构
[1] Univ N Texas, Denton, TX 76203 USA
来源
ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS | 2004年
关键词
D O I
10.1109/ITCC.2004.1286496
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security administration is an uphill task to implement in an enterprise network providing secured corporate services. With the slew of patches being released by Microsoft, HP and other vendors, system administrators require a barrage of tools for analyzing the risk due to these vulnerabilities. In addition to this, criticalities in patching some end hosts (eg., in hospitals) raises serious security issues about the network to which the end hosts are connected. In this context, it would be imperative to know the risk level of all critical resources (e.g., Oracle Server in HR department) keeping in view the everyday emerging new vulnerabilities. We hypothesize that sequence of network actions by an attacker depends on the social behavior (e.g., skill level, tenacity, financial ability). By verifying our hypothesis on hacker email communications, we extended this methodology and calculated risk level for a small network. Towards this goal, we formulated a mechanism to estimate the risk level of critical resources that may be compromised based on attacker behavior. This estimation is accomplished using behavior based attack graphs. These graphs represent all the possible attack paths to all the critical resources. Based on these graphs, we calculate the risk level of a critical resource using Bayesian methodology and periodically update the subjective beliefs about the occurrence of an attack Such a calculated risk level would be a measure of the vulnerability of the resource and it forms an effective basis for a system administrator to perform suitable changes to network configuration. Thus suitable vulnerability analysis and risk management strategies can be formulated to efficiently curtail the risk from different types of attacker (script kiddies, hackers, criminals and insiders).
引用
收藏
页码:445 / 449
页数:5
相关论文
共 15 条
[1]   The changing definition and image of hackers in popular discourse [J].
Chandler, A .
INTERNATIONAL JOURNAL OF THE SOCIOLOGY OF LAW, 1996, 24 (02) :229-251
[2]  
*CORE SEC TECHN, MOD INTR PRACT
[3]  
DESMOND J, 2003, CHECKMATE IDS TRIES
[4]  
JACKSON G, 2003, CHECKMATE INTRUSION
[5]  
JASANOFF S, 1998, SOCIOL REV, V46, P757
[6]  
Loper K., 2000, THESIS MICHIGAN STAT
[7]  
MCQUADE S, 2002, QUALITATIVE EXAMINAT
[8]  
MORRE AP, 2001, CMUSE12001TN001
[9]  
ROGERS M, 2003, THESIS U MANITOBA
[10]  
ROWLEY I, 1989, IEEE C 31 OCT