Network Security and Risk Analysis Using Attack Graphs



Similar documents
Metrics Suite for Enterprise-Level Attack Graph Analysis

Measuring the Overall Security of Network Configurations Using Attack Graphs

Toward Measuring Network Security Using Attack Graphs

NIST Interagency Report 7788 Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs

VEA-bility Security Metric: A Network Security Analysis Tool

Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics

A Review on Zero Day Attack Safety Using Different Scenarios

k-zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks

ON ATTACK GRAPH MODEL OF NETWORK SECURITY. Hasmik Sahakyan, Daryoush Alipour

VEA-bility Analysis of Network Diversification

Attack Graph Techniques

A Novel Approach on Zero Day Attack Safety Using Different Scenarios

How To Analyze And Detect A Network Attack Through A Network Graph

A Graph theoretical approach to Network Vulnerability Analysis and Countermeasures

Parametric Attack Graph Construction and Analysis

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

A Novel Quantitative Approach For Measuring Network Security

Modelling and Analysing Network Security Policies in a Given Vulnerability Setting

Information Security Organizations trends are becoming increasingly reliant upon information technology in

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming

Building A Secure Microsoft Exchange Continuity Appliance

Information Security and Risk Management

An Analytical Framework for Measuring Network Security using Exploit Dependency Graph

Storage Cloud Infrastructures

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

ECS 235A Project - NVD Visualization Using TreeMaps

INFORMATION SUPPLEMENT. Migrating from SSL and Early TLS. Version 1.0 Date: April 2015 Author: PCI Security Standards Council

Using Strategy Objectives for Network Security Analysis

Payment Card Industry (PCI) Executive Report 08/04/2014

How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security

A Formal Approach for Network Security Management Based on Qualitative Risk Analysis

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

Windows Remote Access

Topological Vulnerability Analysis

Scalable, Graph-Based Network Vulnerability Analysis

Goals. Understanding security testing

A Multi-Objective Optimisation Approach to IDS Sensor Placement

Table of Contents. Introduction. Audience. At Course Completion

Secure Software Programming and Vulnerability Analysis

Adversary-Driven State-Based System Security Evaluation

Desktop Security. Overview and Technology Guidance. Michael Ramsey Network Specialist, NC DPI

Representing TCP/IP Connectivity For Topological Analysis of Network Security

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Attack graph analysis using parallel algorithm

Security Metrics What Can We Measure?

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

Cisco Advanced Services for Network Security

IJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 1.852

POMPDs Make Better Hackers: Accounting for Uncertainty in Penetration Testing. By: Chris Abbott

SANS Security 528 CASP Practice Exam

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Penetration Testing Report Client: Business Solutions June 15 th 2015

Aggregating vulnerability metrics in enterprise networks using attack graphs

Tk20 Backup Procedure

A NEW METRICS FOR PREDICTING NETWORK SECURITY LEVEL

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

1 Scope of Assessment

Payment Card Industry (PCI) Executive Report 10/27/2015

Cyber Security Analytics: A Stochastic Model for Security Quantification Using Absorbing Markov Chains

BMC Client Management - SCAP Implementation Statement. Version 12.0

Federal Desktop Core Configuration (FDCC)

Integrating Web Application Security into the IT Curriculum

CDM Vulnerability Management (VUL) Capability

This document describes the methodology used for validating the model, analysis, comments and test results from the model s application.

Attack Modeling and Security Evaluation in SIEM Systems

Reference Architecture: Enterprise Security For The Cloud

Comparative Study of NSSA with Different Network Security Aspects

POLIWALL: AHEAD OF THE FIREWALL

A PREDICTIVE FRAMEWORK FOR CYBER SECURITY ANALYTICS USING ATTACK GRAPHS

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

CTS2134 Introduction to Networking. Module Network Security

Host/Platform Security. Module 11

Transcription:

Network Security and Risk Analysis Using Attack Graphs Anoop Singhal National Institute of Standards and Technology Coauthors: Lingyu Wang and Sushil Jajodia Concordia University George Mason University 1

Outline Motivation and Related Work Example of an Attack Graph Quantitative Security and Risk Analysis Conclusion and Future Work 2

Motivation Typical issues addressed in the literature How can the database server be secured from intruders? How do I stop an ongoing intrusion? Notice that they all have a qualitative nature Better questions to ask: How secure is the database server in a given network configuration? How much security does a new configuration provide? How can I plan my network architecture so it provides a certain amount of security? For this we need a network security modeling and analysis tool 3

Challenges for Quantitative Analysis Counting the number of vulnerabilities is not enough Vulnerabilities have different importance The scoring of a vulnerability is a challenge Context of the Application Configuration of the Application How to compose vulnerabilities for the overall security of a network system 4

Sample Vulnerability 5

Related Work NIST s efforts on standardizing security metric Special publication 500-133 1985, 800-55 2003 NVD and CVSS v2 Attack surface (Howard et. al QoP 06) Page Rank (Mehta et. al RAID 06) Fred Cohen (1998, 2000) 6

Related Work (Cont d) Attack graph Model checker-based (Ritchey et. al S&P 00, Sheyner et. al S&P 02) Graph-based (Noel et. al ACSAC 03, Singhal et. al DBSEC 06, DBSEC 07) 7

What is an Attack Graph A model for How an attacker can combine vulnerabilities to stage an attack such as a data breach Dependencies among vulnerabilities 8

Attack Graph Example 9

Different Paths for the Attack sshd_bof(0,1) ftp_rhosts(1,2) rsh(1,2) local_bof(2) ftp_rhosts(0,1) rsh(0,1) ftp_rhosts(1,2) rsh(1,2) local_bof(2) ftp_rhosts(0,2) rsh(0,2) local_bof(2) 10

Attack Graph from machine 0 to DB Server 11

Attack Graph with Probabilities 0.1 0.8 0.8 0.9 0.9 0. 9 0.1 0.8 Numbers are estimated probabilities of occurrence for individual exploits, based on their relative difficulty. The ftp_rhosts and rsh exploits take advantage of normal services in a clever way and do not require much attacker skill A bit more skill is required for ftp_rhosts in crafting a.rhost file. sshd_bof and local_bof are buffer-overflow attacks, which require more expertise. 12

Probabilities Propagated Through Attack Graph 0.8 0.1 0.8 ( 0.60) 0.9 ( 0.54) 0.9( 0.72) 0.8 0.1 0.9( 0.72) ( 0.087) When one exploit must follow another in a path, this means both are needed to eventually reach the goal, so their probabilities are multiplied: p(a and B) = p(a)p(b) When a choice of paths is possible, either is sufficient for reaching the goal: p(a or B) = p(a) + p(b) p(a)p(b). 13

Network Hardening When we harden the network, this changes the attack graph, along with the way its probabilities are propagated. Our options to block traffic from the Attacker: Make no change to the network (baseline) Block ftp traffic to prevent ftp_rhosts(0,1) and ftp_rhosts(0,2) Block rsh traffic to prevent rsh(0,1) and rsh(0,2) Block ssh traffic to prevent sshd_bof(0,1) 14

Comparison of Options We can make comparisons of relative security among the options Make no change p=0.1 Blocking rsh traffic from Attacker leaves a remaining 4-step attack path with total probability p = 0.1 0.8 0.9 0.1 = 0.0072 Blocking ftp traffic, p=0.0072 But blocking ssh traffic leaves 2 attack paths, with total probability p 0.0865, i.e., compromise is 10 times more likely as compared to blocking rsh or ftp. 15

Need for a Modeling Tool For a large enterprise network that has hundreds of host machines and several services we need a modeling tool that can Generate the attack graph Use the attack graph for quantitative analysis of the current configuration Help the network administrators to decide what changes to make to improve security 16

Probability Of DB Compromise for Each Choice 17

A Model for ROI Analysis 18

ROI Analysis Total Cost = Cost of Firewall Change + (Prob. Of DB Compromise) * (Cost of DB Compromise) Assume Cost of DB Compromise is $20K Cost of a Firewall Rule Change is 0.5K 19

Conclusion Based on attack graphs, we have proposed a model for measuring the overall security of network systems The metric meets intuitive requirements It can be useful for ROI Analysis 20

Future Work Build a Network Security Modeling and Planning Tool Generalize the model to use probability distributions for each vulnerability Apply this technique for ROI Analysis 21