4 research outputs found

    Attack graph based evaluation of network security.

    Get PDF
    Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs (trees, nets), the subsequent checking of various properties of these graphs, and determining security metrics which can explain possible ways to increase security level. The paper suggests a new approach to security evaluation based on comprehensive simulation of malefactor's actions, construction of attack graphs and computation of different security metrics. The approach is intended for using both at design and exploitation stages of computer networks. The implemented software system is described, and the examples of experiments for analysis of network security level are considered

    ΠžΡ†Π΅Π½ΠΊΠ° бСзопасности ΠΊΠΎΠΌΠΏΡŒΡŽΡ‚Π΅Ρ€Π½Ρ‹Ρ… сСтСй Π½Π° основС Π³Ρ€Π°Ρ„ΠΎΠ² Π°Ρ‚Π°ΠΊ ΠΈ качСствСнных ΠΌΠ΅Ρ‚Ρ€ΠΈΠΊ защищСнности

    Get PDF
    Approach to computer network security analysis for using both at design and operation stages is suggested. This approach is based on generating common attack graph and using qualitative security metrics. The graph represents possible scenarios of distributed attacks taking into account network configuration, security policy, malefactor’s location, knowledge level and strategy. The general architecture of the security analysis system proposed, the main concepts of common attack graph, used security metrics taxonomies, metrics calculation rules and general security level evaluation procedure are considered. The suggested security metrics allow to evaluate computer network security level with different detailing level and taking into account different aspects. The implemented software prototype is described, and examples of using the prototype for express-analysis of computer network security level are considered.Π’ Ρ€Π°Π±ΠΎΡ‚Π΅ прСдлагаСтся ΠΏΠΎΠ΄Ρ…ΠΎΠ΄ ΠΊ Π°Π½Π°Π»ΠΈΠ·Ρƒ защищСнности ΠΊΠΎΠΌΠΏΡŒΡŽΡ‚Π΅Ρ€Π½Ρ‹Ρ… сСтСй, ΠΏΡ€Π΅Π΄Π½Π°Π·Π½Π°Ρ‡Π΅Π½Π½Ρ‹ΠΉ для использования ΠΊΠ°ΠΊ Π½Π° этапах ΠΈΡ… проСктирования, Ρ‚Π°ΠΊ ΠΈ эксплуатации. ΠŸΠΎΠ΄Ρ…ΠΎΠ΄ базируСтся Π½Π° автоматичСской Π³Π΅Π½Π΅Ρ€Π°Ρ†ΠΈΠΈ ΠΎΠ±Ρ‰Π΅Π³ΠΎ Π³Ρ€Π°Ρ„Π° Π°Ρ‚Π°ΠΊ ΠΈ использовании качСствСнных ΠΌΠ΅Ρ‚Ρ€ΠΈΠΊ защищСнности. Π“Ρ€Π°Ρ„ ΠΎΡ‚Ρ€Π°ΠΆΠ°Π΅Ρ‚ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½Ρ‹Π΅ распрСдСлСнныС сцСнарии Π°Ρ‚Π°ΠΊ с ΡƒΡ‡Π΅Ρ‚ΠΎΠΌ ΠΊΠΎΠ½Ρ„ΠΈΠ³ΡƒΡ€Π°Ρ†ΠΈΠΈ сСти, Ρ€Π΅Π°Π»ΠΈΠ·ΡƒΠ΅ΠΌΠΎΠΉ ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΠΈ бСзопасности, Π° Ρ‚Π°ΠΊΠΆΠ΅ мСстополоТСния, Ρ†Π΅Π»Π΅ΠΉ, уровня Π·Π½Π°Π½ΠΈΠΉ ΠΈ стратСгий Π½Π°Ρ€ΡƒΡˆΠΈΡ‚Π΅Π»Ρ. РассмотрСны общая Π°Ρ€Ρ…ΠΈΡ‚Π΅ΠΊΡ‚ΡƒΡ€Π° ΠΏΡ€Π΅Π΄Π»Π°Π³Π°Π΅ΠΌΠΎΠΉ систСмы Π°Π½Π°Π»ΠΈΠ·Π° защищСнности, основныС понятия ΠΎΠ±Ρ‰Π΅Π³ΠΎ Π³Ρ€Π°Ρ„Π° Π°Ρ‚Π°ΠΊ, ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌΡ‹Π΅ таксономии ΠΌΠ΅Ρ‚Ρ€ΠΈΠΊ защищСнности, ΠΏΡ€Π°Π²ΠΈΠ»Π° ΠΈΡ… расчСта, Π° Ρ‚Π°ΠΊΠΆΠ΅ ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΈΠΊΠ° ΠΎΡ†Π΅Π½ΠΊΠΈ ΠΎΠ±Ρ‰Π΅Π³ΠΎ уровня защищСнности. ΠŸΡ€Π΅Π΄Π»ΠΎΠΆΠ΅Π½Π½Ρ‹Π΅ ΠΌΠ΅Ρ‚Ρ€ΠΈΠΊΠΈ защищСнности ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‚ ΠΎΡ†Π΅Π½ΠΈΠ²Π°Ρ‚ΡŒ Π·Π°Ρ‰ΠΈΡ‰Π΅Π½Π½ΠΎΡΡ‚ΡŒ ΠΊΠΎΠΌΠΏΡŒΡŽΡ‚Π΅Ρ€Π½ΠΎΠΉ сСти с Ρ€Π°Π·Π»ΠΈΡ‡Π½ΠΎΠΉ ΡΡ‚Π΅ΠΏΠ΅Π½ΡŒΡŽ Π΄Π΅Ρ‚Π°Π»ΠΈΠ·Π°Ρ†ΠΈΠΈ ΠΈ с ΡƒΡ‡Π΅Ρ‚ΠΎΠΌ Ρ€Π°Π·Π»ΠΈΡ‡Π½Ρ‹Ρ… аспСктов. ΠŸΡ€Π΅Π΄ΡΡ‚Π°Π²Π»Π΅Π½ΠΎ описаниС Ρ€Π΅Π°Π»ΠΈΠ·ΠΎΠ²Π°Π½Π½ΠΎΠ³ΠΎ ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΠ½ΠΎΠ³ΠΎ ΠΏΡ€ΠΎΡ‚ΠΎΡ‚ΠΈΠΏΠ° ΠΈ рассмотрСны ΠΏΡ€ΠΈΠΌΠ΅Ρ€Ρ‹ Π΅Π³ΠΎ использования для экспрСсс-Π°Π½Π°Π»ΠΈΠ·Π° защищСнности тСстовой ΠΊΠΎΠΌΠΏΡŒΡŽΡ‚Π΅Ρ€Π½ΠΎΠΉ сСти

    A Framework Based Approach for Formal Modeling and Analysis of Multi-level Attacks in Computer Networks

    No full text
    Attacks on computer networks are moving away from simple vulnerability exploits. More sophisticated attack types combine and depend on aspects on multiple levels (e.g. protocol and network level). Furthermore attacker actions, regular protocol execution steps, and administrator actions may be interleaved
    corecore