Академический Документы
Профессиональный Документы
Культура Документы
Roland Rieke
Fraunhofer-Institut Sichere Telekooperation
Rheinstrasse 75, D-64295 Darmstadt, Germany
E-Mail: rieke@sit.fraunhofer.de
http://private.sit.fraunhofer.de/˜rol
http://www.sit.fraunhofer.de/meta
Attacker telework
Vulnerability DB CVE_xxxx_yyyy CAN_2003_0715
CVE_xxxx_yyyy CAN_xxxx_yyyy
CAN_xxxx_yyyy
Internet
nix_host portal
CAN_2003_0620 CAN_2003_0693
CAN_2003_0693 CAN_2003_0694
CVE_1999_0035
CVE/CAN =
Enterprise Network common vulnerabilities
and exposures
IDS = intrusion detection
db_server system
CAN_2002_0649 IDS_type1 detects
CAN_2003_0715 CAN_2003_0693_ssh_exploit
& rsh_login
Attacker telework
Vulnerability DB CVE_xxxx_yyyy CAN_2003_0715
CVE_xxxx_yyyy CAN_xxxx_yyyy
CAN_xxxx_yyyy
Internet
IDS_type1
nix_host portal
CAN_2003_0620 CAN_2003_0693
CAN_2003_0693 CAN_2003_0694
CVE_1999_0035
CVE/CAN =
Enterprise Network common vulnerabilities
and exposures
Exploits
Attacker
Vulnerabilities - select Exploit
- Identifier - select Source + Target
- Preconditions - apply Exploit
- Impact
state components
Enterprise Network
- Hosts (Products, Services)
- Topology (Firewalls)
- Intrusion Detection Systems
state transition
state components
M-4 M-3 M-8
Enterprise Network
- Hosts (Products, Services)
- Topology (Firewalls)
- Intrusion Detection Systems
state transition
state components
M-4 M-3 M-9 M-8 M-2
Enterprise Network
- Hosts (Products, Services) Counteraction
- Topology (Firewalls) or Service possible global states
- Intrusion Detection Systems
Survivability
Check security properties
Can a client get answers from a DB-server
What security goals can be broken when the network is under attack ?
by a combination of exploits ?
Cost/Benefit analysis M-4 M-3 M-9 M-8 M-2 What are the effects of changes
to intrusion detection systems ?
Find least cost attack breaking
a given security property ?
Abstraction
How much impact can an attacker
produce given a set of exploits ?
How does the attack graph look like
when only attacks that affect
mission critical resources are shown ?
Survivability
Check security properties
Can a client get answers from a DB-server
What security goals can be broken when the network is under attack ?
by a combination of exploits ?
Cost/Benefit analysis M-4 M-3 M-9 M-8 M-2 What are the effects of changes
to intrusion detection systems ?
Find least cost attack breaking
a given security property ?
Abstraction
How much impact can an attacker
produce given a set of exploits ?
How does the attack graph look like
when only attacks that affect
mission critical resources are shown ?
Survivability
Check security properties
Can a client get answers from a DB-server
What security goals can be broken when the network is under attack ?
by a combination of exploits ?
Cost/Benefit analysis M-4 M-3 M-9 M-8 M-2 What are the effects of changes
to intrusion detection systems ?
Find least cost attack breaking
a given security property ?
Abstraction
How much impact can an attacker
produce given a set of exploits ?
How does the attack graph look like
when only attacks that affect
mission critical resources are shown ?
Survivability
Check security properties
Can a client get answers from a DB-server
What security goals can be broken when the network is under attack ?
by a combination of exploits ?
Cost/Benefit analysis M-4 M-3 M-9 M-8 M-2 What are the effects of changes
to intrusion detection systems ?
Find least cost attack breaking
a given security property ?
Abstraction
How much impact can an attacker
produce given a set of exploits ?
How does the attack graph look like
when only attacks that affect
mission critical resources are shown ?
Survivability
Check security properties
Can a client get answers from a DB-server
What security goals can be broken when the network is under attack ?
by a combination of exploits ?
Cost/Benefit analysis M-4 M-3 M-9 M-8 M-2 What are the effects of changes
to intrusion detection systems ?
Find least cost attack breaking
a given security property ?
Abstraction
How much impact can an attacker
produce given a set of exploits ?
How does the attack graph look like
when only attacks that affect
mission critical resources are shown ?
Survivability
Check security properties
Can a client get answers from a DB-server
What security goals can be broken when the network is under attack ?
by a combination of exploits ?
Cost/Benefit analysis M-4 M-3 M-9 M-8 M-2 What are the effects of changes
to intrusion detection systems ?
Find least cost attack breaking
a given security property ?
Abstraction
How much impact can an attacker
produce given a set of exploits ?
How does the attack graph look like
when only attacks that affect
mission critical resources are shown ?
Current Status
some research work on methodology and prototype tool done
presentation at Eicar Conference (May 2004)
(industrial) partners needed for potential CELTIC consortium
proposed work could be part of CELTIC Security Laboratory
Current Status
some research work on methodology and prototype tool done
presentation at Eicar Conference (May 2004)
(industrial) partners needed for potential CELTIC consortium
proposed work could be part of CELTIC Security Laboratory