Network risk management using attacker profiling

被引:29
作者
Dantu, Ram [1 ]
Kolan, Prakash [2 ]
Cangussu, Joao [3 ]
机构
[1] Univ N Texas, Dept Comp Sci & Engn, Denton, TX 76203 USA
[2] Univ N Texas, Dept Comp Sci, Denton, TX 76203 USA
[3] Univ Texas Dallas, Dept Comp Sci, Dallas, TX 75230 USA
关键词
attack graphs; behavior; risk management;
D O I
10.1002/sec.58
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Risk management refers to the process of making decisions that minimize the effects of vulnerabilities on the network hosts. This can be a difficult task in the context of high-exploit probability and the difficult to identify new exploits and vulnerabilities. For many years, security engineers have performed risk analysis using economic models for the design and operation of risk-prone, technological systems using attack profiles. Based on the type of attacker identified, security administrators can formulate effective risk management policies for a network. We hypothesize that sequence of network actions by an attacker depends on the social behavior (e.g., skill level, tenacity, financial ability). We extended this and formulated a mechanism to estimate the risk level of critical resources that may be compromised based on attacker behavior. This estimation is accomplished using behavior based attack graphs representing all the possible attack paths to all the critical resources. The risk level is computed based on these graphs and are used as a measure of the vulnerability of the resource and forming an effective basis for a system administrator to perform suitable changes to network configuration. Copyright (C) 2008 John Wiley & Sons, Ltd.
引用
收藏
页码:83 / 96
页数:14
相关论文
共 25 条
[21]  
SARDAL K, 2004, LECT NOTES COMPUTER
[22]  
SCHEINER B, 1999, DOBBS J DEC
[23]   Automated generation and analysis of attack graphs [J].
Sheyner, O ;
Haines, J ;
Jha, S ;
Lippmann, R ;
Wing, JM .
2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, :273-284
[24]  
SWILER LP, 2001, IEEE S SEC PRIV
[25]  
YUILL J, 1999, RAID S