Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

@

Journal of Information Science and Engineering, Vol. 24 No. 3, pp. 743-767 (May 2008)

Topological Analysis of Multi-phase Attacks Using Expert Systems*

Hamid Reza Shahriari, Yasser Ganjisaffar, Rasool Jalili and Jafar Habibi
Department of Computer Engineering
Sharif University of Technology
Tehran, Iran

With the increasing number and complexity of network attacks, the demand for automatic vulnerability analysis tools has increased. The prerequisite of making these tools is to have a formal and precise model of network configurations and vulnerabilities. Utilizing this model, network administrators can analyze the effects of vulnerabilities on the network and complex attack scenarios can be detected before happening. In this paper, we present a general logic-based framework for modeling network configurations and topologies. Then, a number of important and wide-spread network vulnerabilities are modeled as general inference rules based on the framework definitions. We implemented the approach using an expert system to analyze network configurations and detect how an attacker may exploit chain of vulnerabilities to reach his goal. Our approach explores all attacking paths and generates the closure of access rights that the attacker can gain by exploiting the vulnerabilities. The time complexity of calculating the closure is polynomial. Having the closure, we can test if a user has a special right over a resource in just O(1) time complexity. Moreover, the firewall filtering rules can be modeled and analyzed to determine the initial accesses in the network. Our framework is more flexible than previous ones, as it can model some major parts of Denial of Service (DoS) attacks and infer about network topology. Finally, a case study is also presented to explore the model applicability and show its efficiency and flexibility.

Keywords: computer security, vulnerability model, vulnerability analysis, topological analysis, attack, expert system

Full Text () Retrieve PDF document (200805_06.pdf)

Received May 1, 2006; revised August 1, 2006; accepted January 23, 2007.
Communicated by Tzong-Chen Wu.
* This research was partially supported by Iran Telecommunication Research Center (ITRC) by contract No. 500/419.