A framework for automated identification of attack scenarios on IT infrastructures


Autoria(s): Camtepe, Seyit A.; Bsufka, Karsten; Hennig, Leonhard; Simsek, Cihan; Albayrak, Sahin
Data(s)

01/04/2012

Resumo

Due to increased complexity, scale, and functionality of information and telecommunication (IT) infrastructures, every day new exploits and vulnerabilities are discovered. These vulnerabilities are most of the time used by ma¬licious people to penetrate these IT infrastructures for mainly disrupting business or stealing intellectual pro¬perties. Current incidents prove that it is not sufficient anymore to perform manual security tests of the IT infra¬structure based on sporadic security audits. Instead net¬works should be continuously tested against possible attacks. In this paper we present current results and challenges towards realizing automated and scalable solutions to identify possible attack scenarios in an IT in¬frastructure. Namely, we define an extensible frame¬work which uses public vulnerability databases to identify pro¬bable multi-step attacks in an IT infrastructure, and pro¬vide recommendations in the form of patching strategies, topology changes, and configuration updates.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/57361/

Publicador

De Gruyter

Relação

http://eprints.qut.edu.au/57361/1/4J2012_Camtepe.pdf

DOI:10.1515/pik-2012-0005

Camtepe, Seyit A., Bsufka, Karsten, Hennig, Leonhard, Simsek, Cihan, & Albayrak, Sahin (2012) A framework for automated identification of attack scenarios on IT infrastructures. PIK ( Praxis der Informationsverarbeitung und Kommunikation) Journal on Network Attack Detection and Defence, 35(1), pp. 25-31.

Direitos

Copyright 2012 De Gruyter

The final publication is available at www.degruyter.com

Fonte

School of Electrical Engineering & Computer Science; Information Security Institute; Science & Engineering Faculty

Palavras-Chave #080303 Computer System Security #080503 Networking and Communications #100503 Computer Communications Networks #attack tree #attack graph #vulnerability assessment #attack modelling #reachability analysis #security simulation #attack scenario
Tipo

Journal Article