1 / 35

Automatic Generation and Analysis of Attack Graphs

Automatic Generation and Analysis of Attack Graphs. Written by Oleg Sheyner, Joshua Haines, Somesh Jha, Richard Lippmann, and Jeannette M. Wing IEEE Symposium on Security and Privacy 2002. Presented by HAN Jin Singapore Management University September 2008. Outline. Preliminaries

gada
Download Presentation

Automatic Generation and Analysis of Attack Graphs

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Automatic Generation and Analysis of Attack Graphs Written by Oleg Sheyner, Joshua Haines, Somesh Jha, Richard Lippmann, and Jeannette M. Wing IEEE Symposium on Security and Privacy 2002 Presented by HAN Jin Singapore Management University September 2008

  2. Outline • Preliminaries • Motivation • Attack Graph Definition • Automated Generation • An Illustrative Example • Automated Analysis • Limitations

  3. Outline • Preliminaries • Motivation • Attack Graph Definition • Automated Generation • An Illustrative Example • Automated Analysis • Limitations

  4. Vulnerability • In computer security, the term vulnerability is applied to a weakness in a system which allows an attacker to violate the integrity of that system. • Vulnerabilities may result from weak passwords, software bugs, a computer virus or other malware, a script code injection, or a SQL injection.

  5. Common Vulnerabilities and Exposures • http://cve.mitre.org/ • CVE is a list or dictionary that provides common names for publicly known information security vulnerabilities and exposures • Every vulnerability is assigned with a CVE Number: E.g. CVE-2008-0075: Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.1 through 6.0 allows remote attackers to execute arbitrary code via crafted inputs to ASP pages.

  6. Exploit • An exploit is a piece of software, a chunk of data, or sequence of commands that take advantage of a vulnerability in order to cause unintended or unanticipated behavior to occur on computer software & hardware. • Commonly categorized and named by the type of vulnerability they utilize: E.g. SQL Injection Vulnerability  SQL Inj. Exploit Buffer Overflows Vulnerability  B.O. Exploit

  7. Attack Path • An attacker may need several steps to achieve his attack goal: • Attack path: a series of exploits/atomic attacks

  8. Outline • Preliminaries • Motivation • Attack Graph Definition • Automated Generation • An Illustrative Example • Automated Analysis • Limitations

  9. Limitations of Former Tools • Limitations of Vulnerability Scanners • Generate overwhelming amount of data Example Nessusscan • Elapsed time: 00:48:07 • Total security holes found: 255 • High severity: 40 • Low severity: 117 • Informational: 98 • No indication of how vulnerabilities can be combined • Limitations of Intrusion Detection Systems • Generate overwhelming number of alerts • Many false alerts • Require extensive human intervention • Alerts are isolated, no indication of how alerts can be combined • Where does a security administrator start?

  10. What is lacking? • Context for total network security • How outsiders penetrate firewalls and launch attacks from compromised hosts • Insider attacks

  11. Attack Graph • Attack graph is the data structure which is used to represent all possible attacks on a network • Formal Definition:

  12. Algorithm for Generating Attack Graphs

  13. Example of Attack Graph Developed by a Professional Red Team Sandia Red Team “White Board” attack graph from DARPA CC20008 Information battle space preparation experiment

  14. Problem Statement • Problem: Generating attack graphs by hand is tedious, error-prone, and impractical for large systems. • Goal: Automate the generation and analysis of attack graphs. • Generation • Must be fast and completely automatic • Must handle large, realistic examples • Should guarantee properties of attack graphs • Analysis • Must enable security analysis by system administrators • Should support incremental, partial specification

  15. Outline • Preliminaries • Motivation • Attack Graph Definition • Automated Generation • An Illustrative Example • Automated Analysis • Limitations

  16. Procedure • XML spec for: network, vulnerability, connections, safety property… • NuSMV: symbolic model checkers, modified version, used to automatically produce AG • Graph visualization tools

  17. = Attacker gains root access to Host 1. 4 hosts30 actions138 nodes742 edges6 minutes

  18. A Graph Larger than Fits on Screen = Attacker gains root access to Host 1. 4 hosts30 actionslarger initial state space310 nodes3400 edges30 minutes

  19. Outline • Preliminaries • Motivation • Attack Graph Definition • Automated Generation • An Illustrative Example • Automated Analysis • Limitations

  20. IDS firewall firewall Action Arsenal IIS buffer overflow: remotely get root Squid portscan: port scan LICQ remote-to-user: gain user privileges remotely IE scripting exploit: gain user privileges remotely local buffer overflow: locally get root Always Detected An Illustrative Example Windows IIS Web Server IE LICQ attacker Squid database Linux Attack goal: disrupt the functioning of the database

  21. Security Property • Attack graphs depict ways in which an intruder can force a network into an unsafe state: • E.g. in this network

  22. IDS firewall firewall Example Attack Graph Windows IIS Web Server LICQ attacker Squid database Linux

  23. IDS firewall firewall Alternative Attack Scenario Avoiding IDS Windows IIS Web Server LICQ attacker Squid database Linux

  24. Outline • Preliminaries • Motivation • Attack Graph Definition • Automated Generation • An Illustrative Example • Automated Analysis • Limitations

  25. Single Action Removal

  26. Minimization Analyzer • What actions are necessary for the intruder to succeed? • Given a fixed set of atomic attacks, not all of them may be available to the intruder • Nondeterministically decide which subset of atomic attacks to choose initially

  27. Minimum Critical Set of Actions A = the set of actions available to the intruder Def 1: A set of actions C is critical if the intruder cannot achieve his goal using only actions in A \ C. Def 2: A critical set of actions C is minimum if there is no critical action set of smaller size. Def 3: A set of actions A’ Ais realizable if the intruder can achieve his goal using only actions in A’. • Minimum Critical Set of Actions (MCSA): • Given a set of actions A and an attack graph G, find • a minimum critical action subset C  A. Finding a minimum set: NP-complete

  28. Reliability Analyzer • What is the likelihood that the intruder goes undetected? • Interpret as a Markov Decision Process • Assign probability for detecting each atomic attack • Each attack has both detectable and stealthy variants Probabilistic Attack Graph

  29. Security Property System Model Generator Phase 1 Attack Graph Annotations Query: What actions are necessary for the intruder to succeed? Query: What is the likelihood that the intruder goes undetected? Query: What is the intruder’s risk of discovery during an attack? Minimization Analyzer ReliabilityAnalyzer RiskAnalyzer Phase 2 … Attack Subgraph Probabilistic Attack Graph Payoff Attack Graph Overview of their work

  30. Outline • Preliminaries • Motivation • Attack Graph Definition • Automated Generation • An Illustrative Example • Automated Analysis • Limitations

  31. Limitations • Attack Graph Visualization Problem

  32. Scalability Problem Too complex and difficult to use for large network One possible solution: Ou, X., Boyer, W. F., and McQueen, M. A. A scalable approach to attack graph generation. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06). ACM, New York, NY, 336-345.

  33. Zero-day exploit • A zero-day (or zero-hour) attack or threat is a computer threat that tries to exploit unknown, undisclosed or unpatched computer application vulnerabilities • Current attack graph analysis is based completely on known vulnerability info

  34. Q & AThanks

More Related