A Graphical Model to Assess the Impact of Multi-Step Attacks

被引:16
|
作者
Albanese, Massimiliano [1 ]
Jajodia, Sushil [1 ,2 ]
机构
[1] George Mason Univ, Dept Informat Sci & Technol, Fairfax, VA 22030 USA
[2] George Mason Univ, Ctr Secure Informat Syst, Volgenau Sch Engn, Fairfax, VA 22030 USA
关键词
Attack graphs; dependency graphs; impact analysis;
D O I
10.1177/1548512917706043
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In the last several decades, networked systems have grown in complexity and sophistication, introducing complex interdependencies amongst their numerous and diverse components. Attackers can leverage such interdependencies to penetrate seemingly well-guarded networks through sophisticated multi-step attacks. Research has shown that explicit and implicit interdependencies exist at various layers of the hardware and software architecture. In particular, dependencies between vulnerabilities and dependencies between applications and services are critical for assessing the impact of multi-step attacks. These two classes of interdependencies have been traditionally studied using attack and dependency graphs respectively. Although significant work has been done in the area of both attack and dependency graphs, we demonstrate that neither of these models can provide an accurate assessment of an attack's impact, when used in isolation. To address this limitation, we take a mission-centric approach and present a solution to integrate these two powerful models into a unified framework that enables us to accurately assess the impact of multi-step attacks and identify high-impact attack paths within a network. This analysis can ultimately generate effective hardening recommendations, and can be seen as one phase of a continuous process that iteratively cycles through impact analysis and vulnerability remediation stages.
引用
收藏
页码:79 / 93
页数:15
相关论文
共 50 条
  • [1] Multi-step Jailbreaking Privacy Attacks on ChatGPT
    Li, Haoran
    Guo, Dadi
    Fan, Wei
    Xu, Mingshi
    Huang, Jie
    Meng, Fanpu
    Song, Yangqiu
    FINDINGS OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS - EMNLP 2023, 2023, : 4138 - 4153
  • [2] Processing of IDS alerts in multi-step attacks
    Bajtos, Tomas
    Sokol, Pavol
    Kurimsky, Frantisek
    SOFTWARE IMPACTS, 2024, 19
  • [3] Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking
    Shevrin, Ilia
    Margalit, Oded
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6025 - 6042
  • [4] Causal knowledge analysis for detecting and modeling multi-step attacks
    Ramaki, Ali Ahmadian
    Rasoolzadegan, Abbas
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 6042 - 6065
  • [5] A Multi-Step Approach to Assess the Lifecycle Economic Impact of Seismic Risk on Optimal Energy Retrofit
    Mauro, Gerardo Maria
    Menna, Costantino
    Vitiello, Umberto
    Asprone, Domenico
    Ascione, Fabrizio
    Bianco, Nicola
    Prota, Andrea
    Vanoli, Giuseppe Peter
    SUSTAINABILITY, 2017, 9 (06)
  • [6] Step by Step Loss Goes Very Far: Multi-Step Quantization for Adversarial Text Attacks
    Gainski, Piotr
    Balazy, Klaudia
    17TH CONFERENCE OF THE EUROPEAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, EACL 2023, 2023, : 2038 - 2048
  • [7] Generating a benchmark cyber multi-step attacks dataset for intrusion detection
    Almseidin, Mohammad
    Al-Sawwa, Jamil
    Alkasassbeh, Mouhammd
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 43 (03) : 3679 - 3694
  • [8] Knowledge Base System for Risk Analysis of the Multi-step Computer Attacks
    Yakhyaeva, Gulnara
    Ershov, Aleksey
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL 2 (ICEIS), 2016, : 143 - 150
  • [9] Morwilog: an ACO-based System for Outlining Multi-Step Attacks
    Navarro-Lara, Julio
    Deruyver, Aline
    Parrend, Pierre
    PROCEEDINGS OF 2016 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2016,
  • [10] Detecting Multi-Step Attacks: A Modular Approach for Programmable Data Plane
    Laraba, Abir
    Francois, Jerome
    Chrisment, Isabelle
    Chowdhury, Shihabur Rahman
    Boutaba, Raouf
    PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,