attack modeling for information security and survivability

36
Attack Modeling for Information Security and Survivability Presented By Chad Frommeyer

Upload: hinto

Post on 12-Feb-2016

137 views

Category:

Documents


0 download

DESCRIPTION

Attack Modeling for Information Security and Survivability. Presented By Chad Frommeyer. Introduction. Introduction Attack Trees Attack Pattern Reuse Attack Tree Refinement Conclusions. Introduction. Problem Attack Data not used for improving Design and Implementation - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Attack Modeling for Information Security and Survivability

Attack Modeling for Information Security and Survivability

Presented ByChad Frommeyer

Page 2: Attack Modeling for Information Security and Survivability

Introduction

• Introduction• Attack Trees• Attack Pattern Reuse• Attack Tree Refinement• Conclusions

Page 3: Attack Modeling for Information Security and Survivability

Introduction

• Problem– Attack Data not used for improving Design

and Implementation– Engineers still not learning from the past– Need a better way to utilize past attack data

• Solution (Attack Trees/Patterns)• ACME Enterprise

Page 4: Attack Modeling for Information Security and Survivability
Page 5: Attack Modeling for Information Security and Survivability

Attack Trees

• Definition– a systematic method to characterize system

security based on varying attacks

Page 6: Attack Modeling for Information Security and Survivability

Attack Trees (Structure/Semantics)

• Root Node• Tree Nodes

– Attack Sub-Goals• AND-Decomposition requires all to succeed• OR-Decomposition requires one to succeed

Page 7: Attack Modeling for Information Security and Survivability

AND Decomposition

OR Decomposition

Page 8: Attack Modeling for Information Security and Survivability

Attack Trees

• Intrusion Scenarios– Scenarios that result in achieving the primary

goal– Generated by traversing the tree in a depth-

first manner– Intermediate nodes are not appear

• Branch Refinement• ACME Attack Tree

Page 9: Attack Modeling for Information Security and Survivability
Page 10: Attack Modeling for Information Security and Survivability
Page 11: Attack Modeling for Information Security and Survivability

Attack Trees

• ACME intrusion scenarios• <1.1> , <1.2> , <2.1, 2.2, 2.3, 2.4>• <3.1> , <3.2>• <4.1> , <4.2> , <5.1> , <5.2> , <5.3>• <6.1> , <6.2>

Page 12: Attack Modeling for Information Security and Survivability

Attack Trees

• Refinement of ACME node 5.3

Page 13: Attack Modeling for Information Security and Survivability
Page 14: Attack Modeling for Information Security and Survivability

Attack Trees

• ACME intrusion scenarios (Refined)• <1, 2.1, 3.1, 4.1, 5.1> , <1, 2.2, 3.1, 4.1, 5.1>• <1, 2.3, 3.1, 4.1, 5.1> , <1, 2.1, 3.2, 4.1, 5.1>• <1, 2.2, 3.2, 4.1, 5.1> , <1, 2.3, 3.2, 4.1, 5.1>• <1, 2.1, 3.1, 4.2, 5.1> , <1, 2.2, 3.1, 4.2, 5.1>• <1, 2.3, 3.1, 4.2, 5.1> , <1, 2.1, 3.2, 4.2, 5.1>• <1, 2.2, 3.2, 4.2, 5.1> , <1, 2.3, 3.2, 4.2, 5.1>

Page 15: Attack Modeling for Information Security and Survivability

Attack Pattern Reuse

• Definition• Components of an Attack Pattern• Pertain to Software and Hardware• Attack Profiles

Page 16: Attack Modeling for Information Security and Survivability

Attack Pattern Reuse

• Components of an Attack Pattern– Overall Goal– Preconditions/Assumptions– Attack Steps– Post-conditions (true if attack is successful)

Page 17: Attack Modeling for Information Security and Survivability
Page 18: Attack Modeling for Information Security and Survivability

Buffer Overflow Attack

Page 19: Attack Modeling for Information Security and Survivability
Page 20: Attack Modeling for Information Security and Survivability

Unexpected Operator Attack

Page 21: Attack Modeling for Information Security and Survivability
Page 22: Attack Modeling for Information Security and Survivability
Page 23: Attack Modeling for Information Security and Survivability

Attack Pattern Reuse

• Components of an Attack Profile– Common Reference Model– Set of Variants– Set of Attack Patterns– Glossary of terms and phrases

Page 24: Attack Modeling for Information Security and Survivability

Attack Reference Model

Page 25: Attack Modeling for Information Security and Survivability
Page 26: Attack Modeling for Information Security and Survivability

Attack Tree Refinement

• Refinement Process• Require security expertise• Attack pattern libraries

Page 27: Attack Modeling for Information Security and Survivability
Page 28: Attack Modeling for Information Security and Survivability

Attack Tree Refinement

• Profile/Enterprise Consistency• Definition: “Consistency”• Attack Pattern Relevance• ACME Example

– Org = ACME– Intranet = ACME Internet– Firewall = ACME Firewall

Page 29: Attack Modeling for Information Security and Survivability

Attack Tree Refinement

• Resulting Reference Model

Page 30: Attack Modeling for Information Security and Survivability

Attack Tree Refinement

• Pattern Application– Show relevance to the attack tree goal

(relevance)– Applying Attack Patterns

Page 31: Attack Modeling for Information Security and Survivability
Page 32: Attack Modeling for Information Security and Survivability
Page 33: Attack Modeling for Information Security and Survivability
Page 34: Attack Modeling for Information Security and Survivability
Page 35: Attack Modeling for Information Security and Survivability
Page 36: Attack Modeling for Information Security and Survivability

Conclusions

• Objective• Documentation via Attack Trees/Profiles• Documentation Reuse• Questions still to answer• Continued Research