200 likes | 302 Views
Su Zhang Computing and Information Science Kansas State University. Abstracted Model Generator (AMG): Another Perspective Of Mitigating Scalability Issues . Background. Two ways of presenting (potential) network security issues. Attack graph. Quantitative value
E N D
Su Zhang Computing and Information Science Kansas State University Abstracted Model Generator (AMG): Another Perspective Of Mitigating Scalability Issues
Background • Two ways of presenting (potential) network security issues. • Attack graph. • Quantitative value • Probability of being compromised of some “asset” (hosts, server, workstation, etc.) • Loss expectation (Usually in terms of monetary). Final Project Presentation for CIS 890
Attack Graphs • State Enumerate • Carnegie Mellon University, Oleg Sheyner, et al. 2002 • Extremely poor scalability (exponential). • Logical Dependency Graphs • MIT Lincoln Lab Attack Graphs (MIT-LL-AG)(Lippmann et al. 2006)(Lippmann et al. 2005) • Uncertain for large scale networks. [6] • George Mason University (Ammann,Wijesekera, & Kaushik2002)(Jajodia, Noel, & O’Berry 2003) • Poor scalability (O(N6)). [6] • Kansas State University Attack Graph (KSU-AG)(XinmingOu, et al. 2006) • Fastest so far (between O(N2) and O(N3)). [6] Final Project Presentation for CIS 890
Quantitative Risk Assessment • Lingyu Wang, et al. (GMU) • Not scalable (Bayesian Network) • TeodorSommestad, et al. (Royal Institute of Technology (KTH)) • Not scalable (Bayesian Network) • John Homer and XinmingOu. (KSU) • De-separate set (Faster than the other two, but still not fast enough). Final Project Presentation for CIS 890
Current Limitations • Accuracy • Database limitation. • Vendors don’t publish vulnerability information until it gets patched. • Centralized databases (e.g. NVD and OSVDB) have lots of errors and maintained inconsistently. • Scalability • Couldn’t be finished fast enough for large scale networks’ quantitative risk assessment. Final Project Presentation for CIS 890
How to Mitigate Scalability Issue? – Network Abstraction • Downscale enterprise-size networks into small ones. • Easier for SAs to do some basic analysis. • Provide trimmed input for analyzers to mitigate the scalability issues. • Attack-graph analyzer. • Quantitative risk assessment analyzer. Final Project Presentation for CIS 890
Network Abstraction Steps • Reachability-based grouping • Grouping all unfiltered nodes (don’t have inter-subnet connections) into one. • Grouping all filtered nodes having same inter-subnet reachability (same in terms of inbound and outbound connections). • Configuration-based breakdown • Further breakdown both unfiltered and filtered nodes based on their configurations. Final Project Presentation for CIS 890
Network Abstraction-Beginning Stage In subnet Internet Final Project Presentation for CIS 890
Network Abstraction- Identifying the Reachability Information Hosts without inter-subnet connections In subnet Unfiltered Internet Filtered Hosts including inter-subnet connections. Different colors suggest different inter-subnet reachabilities. Final Project Presentation for CIS 890
Network Abstraction-Merging Unfiltered Nodes into One Hosts without inter-subnet connections In subnet Merged unfiltered nodes into one Internet Filtered Hosts including inter-subnet connections. Different colors suggest different reachabilities. Final Project Presentation for CIS 890
Reachability-based Grouping Hosts without inter-subnet connections In subnet Merged unfiltered nodes into one Internet Filtered Hosts including inter-subnet connections. Different colors suggest different reachabilities. Same-colored nodes are merged. Final Project Presentation for CIS 890
Configuration-based Breakdown Hosts without inter-subnet connections In subnet Further breakdown unfiltered network based on configuration Internet Filtered Hosts including inter-subnet connections. Different colors suggest different configurations. Final Project Presentation for CIS 890
Case Study--Configuration • Configuration • 3 subnets (file servers, work stations and normal user desktops (say subnet1)) • 10 Hosts per subnet (Divided by two types of configurations (Windows and Linux)). • 2 vulnerabilities on each host. The type of vulnerability could be local, remote server and remote client based on CVSS vectors in National Vulnerability Database (NVD). Final Project Presentation for CIS 890
Case Study--Topology Final Project Presentation for CIS 890
Case Study—Original Attack graph (41K) Final Project Presentation for CIS 890
Case Study—Attack graph (27K) Final Project Presentation for CIS 890
Quantitative Results Comparison • This part is to be done soon. • Comparing the results from original model and abstracted model is meaningful if the two value are close enough, then we can conclude with that our ANM is useful. Final Project Presentation for CIS 890
Conclusions • AMG can provide SAs a clearer overview of entire network. • AMG will help SAs to get smaller –sized attack graphs and hence reduce the workload of SAs. • AMG can mitigate scalability issue for quantitative risk assessment. Final Project Presentation for CIS 890
References • [1] Automated generation and analysis of attack graphs. Oleg Sheyner, Joshua Haines, SomeshJha, Richard Lippmann, and Jeannette M. Wing. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2002. • [2] Evaluating and strengthening enterprise network security using attack graphs.R.P. Lippmann, K.W. Ingols, C. Scott, K. Piwowarski, K.J. Kratkiewicz, M. Artz, and R.K. Cunningham. Technical Report, MIT Lincoln Laboratory, October, 2005. • [3] Practical attack graph generation for network defense.Kyle Ingols, Richard Lippmann, and Keith Piwowarski. ACSAC 2006. • [4] Minimum-cost network hardening using attack graphs.Lingyu Wang, Steven Noel and SushilJajodia. Computer Communications. • [5] Modeling modern network attacks and countermeasures using attack graphs.Kyle Ingols, Matthew Chu, Richard Lippmann, et al. In 25th Annual Computer Security Applications Conference (ACSAC), 2009. • [6] Intelligent Cyber Security Analysis in Enterprise Networks.Jason H. Li and Peng Liu. In Association for the Advancement of Artificial Intelligence (www.aaai.org), 2007. • [7] Advanced Cyber Attack Modeling, Analysis, And Visualization.SushilJajodia and Steven Noel. Final Technical Report, March 2010. • [8] Measuring network security using Dynamic Bayesian Network.Marcel Frigault, Lingyu Wang, AnoopSinghal, and SushilJajodia. In Proceedings of the 4th ACM workshop on Quality of Protection (QoP), 2008. • [9] A probabilistic relational model for security risk analysis.TeodorSommestad*, Mathias Ekstedt and Pontus Johnson. Journal of Computer & Security 29, 2010 pp 659-679. Final Project Presentation for CIS 890
Questions & Discussions Thank you! Final Project Presentation for CIS 890