A framework for automated identification of attack scenarios on IT infrastructures
Data(s) |
01/04/2012
|
---|---|
Resumo |
Due to increased complexity, scale, and functionality of information and telecommunication (IT) infrastructures, every day new exploits and vulnerabilities are discovered. These vulnerabilities are most of the time used by ma¬licious people to penetrate these IT infrastructures for mainly disrupting business or stealing intellectual pro¬perties. Current incidents prove that it is not sufficient anymore to perform manual security tests of the IT infra¬structure based on sporadic security audits. Instead net¬works should be continuously tested against possible attacks. In this paper we present current results and challenges towards realizing automated and scalable solutions to identify possible attack scenarios in an IT in¬frastructure. Namely, we define an extensible frame¬work which uses public vulnerability databases to identify pro¬bable multi-step attacks in an IT infrastructure, and pro¬vide recommendations in the form of patching strategies, topology changes, and configuration updates. |
Formato |
application/pdf |
Identificador | |
Publicador |
De Gruyter |
Relação |
http://eprints.qut.edu.au/57361/1/4J2012_Camtepe.pdf DOI:10.1515/pik-2012-0005 Camtepe, Seyit A., Bsufka, Karsten, Hennig, Leonhard, Simsek, Cihan, & Albayrak, Sahin (2012) A framework for automated identification of attack scenarios on IT infrastructures. PIK ( Praxis der Informationsverarbeitung und Kommunikation) Journal on Network Attack Detection and Defence, 35(1), pp. 25-31. |
Direitos |
Copyright 2012 De Gruyter The final publication is available at www.degruyter.com |
Fonte |
School of Electrical Engineering & Computer Science; Information Security Institute; Science & Engineering Faculty |
Palavras-Chave | #080303 Computer System Security #080503 Networking and Communications #100503 Computer Communications Networks #attack tree #attack graph #vulnerability assessment #attack modelling #reachability analysis #security simulation #attack scenario |
Tipo |
Journal Article |