Network combo attack modeling analysis

Network Modeling and Analysis of combined attacks (attacks that may exist in the network for analysis)

Here is the quote "Advances in network modeling methods combined attack" Mao Handong Zhang Weiming Chen Feng Zhu Cheng Computer Science ZOO 7 Vol.34 N0.11

"Advances in network modeling methods combined attack - Computer Science ZOO Vol34 N0.11" a text of this article to analyze, interpret, hope this will help everyone learn together.

1. What is a combination of network attack modeling

Network modeling combined attack, speaking more abstract. We attack from the perspective of the relationship between each network vulnerability analysis, network attacks depicts a possible attack paths can lead to the direct and indirect impact of effective safety assessment of network attacks. That is, to identify possible attack paths, if with IDS, can predict the target.

2, a basic model framework

2.1 attacked network modeling

Network host set H

Host unique identification Host running network application service name and corresponding listening port list
Other software list type of operating system version The vulnerability of existing host software vulnerabilities
Misconfiguration vulnerability Vulnerability Management

Mutual connection relationships between reachability host C

C(h1,h2,p) Host with the host port p h1 by h2 up, increase the network layer, the transport layer, application layer connectivity properties

Trust relationships between host T

T(h1,h2) h1 h2 may not need to authorize access

Defense Modeling 2.2 Network

ids intrusion detection model

Describe what actions can be found in the intrusion detection system

2.3 Modeling menace

I intruder capacity

Intruder know the host user name and password User privileges on each host

A intruder may take the atomic attacks

Memory overflow attacks Software Vulnerability Remote login

2.4 atom attack mode library

Set of premises:
when trying to use the main threat to describe a set of essential conditions needed to have a vulnerability, and only set of premises to meet the main threat, it could successfully exploit this vulnerability.
The results set:
the result set describe the results by successfully exploited this vulnerability arising, including elevated privileges, increasing connectivity relationships, secure destruction and the destruction of data security services.
For example: A condition required for the
operating system: windows, version 7 or less, the architecture is not limited to, the kernel is not limited to
the application: HTTP, 1.0 the following
access requirements: remote access, root privileges
open port 80, run the program not
generated the results are:
confidentiality: files on the available hosts
integrity: users can modify the file
usability: users can paralyze the network
security: to obtain root privileges
Here Insert Picture Description

3, a combination of network attack model generation algorithm

Forward search algorithm: initial state to target state path up the search.
The initial state

Network access
The state of the network itself Host configuration information, trust network connection information between information, host
IDS status of defensive measures

Target state:
probably a collection of network attacks is because a path, when the attack to a different step, network status and state of defense may be different.
Search process:
breadth-first, depth-first search algorithm, the atomic attack mode library for each attack mode to match the conditions, if the attack is successful then the next state match further attacks. The calculation process and the presence of relatively large search space.
Backward search algorithm, the search to the initial state from the target state, regardless of the state of the target state does not produce.

4, attack model data structure

4.1 attack tree structure

The picture shows the tree structure under attack, the background is a software attack, up to watch, from the presence of "or", "and" two structures, $ money it takes to take this measure.
Here Insert Picture Description
Attack Tree advantages: (1) to take expert brainstorming, and the integration of these observations to attack the tree go. (2) capable of cost-benefit analysis or probabilistic analysis. (3) capable of modeling non
often complex attack scenarios.
Attack Tree disadvantages: (1) Due to the inherent limitations of the tree, the tree can not be used to model multiple attacks to try to attack, and time-dependent access control scenarios. (2) can not be used to model recurring events. (3) For the reality of large-scale network attack tree method to deal with them will be very complicated.

4.2 attack graph structure

4.2.1 FIG attacks based on the state
of a node represents a state of the system, to take every state change such attack.
4.2.2 attacks based on FIG permeate
began to evolve from the initial state, the nodes represent the penetration means, the edges represent state changes.
In this paper, permeation based attacks FIG lower spatial complexity.
Here Insert Picture Description

Released six original articles · won praise 9 · views 1207

Guess you like

Origin blog.csdn.net/weixin_38551640/article/details/104253426