Model-Based Analysis of Configuration Vulnerabilities

نویسندگان

  • C. R. Ramakrishnan
  • R. C. Sekar
چکیده

Vulnerability analysis is concerned with the problem of identifying weaknesses in computer systems that can be exploited to compromise their security. In this paper we describe a new approach to vulnerability analysis based on model checking. Our approach involves: Formal specification of desired security properties. An example of such a property is “no ordinary user can overwrite system log files.” An abstract model of the system that captures its security-related behaviors. This model is obtained by composing models of system components such as the file system, privileged processes, etc. A verification procedure that checks whether the abstract model satisfies the security properties, and if not, produces execution sequences (also called exploit scenarios) that lead to a violation of these properties. An important benefit of a model-based approach is that it can be used to detect known and as-yet-unknown vulnerabilities. This capability contrasts with previous approaches (such as those used in COPS and SATAN) which mainly address known vulnerabilities. This paper demonstrates our approach by modelling a simplified version of a UNIX-based system, and analyzing this system using model-checking techniques to identify nontrivial vulnerabilities. A key contribution of this paper is to show that such an automated analysis is feasible in spite of the fact that the system models are infinite-state systems. Our techniques exploit some of the latest techniques in model-checking, such as constraint-based (implicit) representation of state-space, together with domain-specific optimizations that are appropriate in the context of vulnerability analysis. Clearly, a realistic UNIX system is much more complex than the one that we have modelled in this paper. Nevertheless, we believe that our results show automated and systematic vulnerability analysis of realistic systems to be feasible in the near future, as model-checking techniques continue to improve.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)

Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a fact, exploiting most of vulnerabilities result in access rights alteration. In this paper, we propose a new vulnerability analysis method based on the Take-Grant protection model. We extend the initial TakeGrant model...

متن کامل

An Integrated Closed-loop Supply Chain Configuration Model and Supplier Selection based on Offered Discount Policies

In this paper, a mathematical programming model is presented for integrated problem of closed loop supply chain network design and supplier selection. The suppliers  propose discount policy based on purchase amount and loyalty of buyers which are both taken from the elements of RFM (Recency, Frequency and Monetary) technique. The main objective of this paper which is formulated by a mixed-integ...

متن کامل

Model-Based Analysis of Configuration Vulnerabilities

Vulnerability analysis is concerned with the problem of identifying weaknesses in computer systems that can be exploited to compromise their security. In this paper we describe a new approach to vulnerability analysis based on model checking. Our approach involves: • Formal specification of desired security properties. An example of such a property is “no ordinary user can overwrite system log ...

متن کامل

The recognition of the necessity of for community-based disaster risk management to reduce the risk of vulnerability to earthquake disaster (case study: YousefAbad neighborhood of Tehran)

Disaster management and current attitudes in this area only focus on this areachr('39')s physical vulnerabilities, raising urban residentschr('39') exposure to these challenges in front of the earthquake. On the other hand, Incidental actions include reducing the vulnerability and the physical strengthening and promotion of poor organization during the disaster; they ignored the capabilities an...

متن کامل

Modification of exponential based hyperelastic strain energy to consider free stress initial configuration and Constitutive modeling

In this research, the exponential stretched based hyperelastic strain energy was modified to provide the unstressed initial configuration. To this end, as the first step, the model was calibrated by the experimental data to find the best material parameters. The fitting results indicated material stability in large deformations and basic loading modes. In the second step, the initial pseudo str...

متن کامل

Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities

Modeling and analyzing information system vulnerabilities help predict possible attacks to computer networks using vulnerabilities information and the network configuration. In this paper, we propose a comprehensive approach to analyze network vulnerabilities in order to answer the safety problem focusing on vulnerabilities. The approach which is called Vulnerability Take Grant (VTG) is a graph...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Journal of Computer Security

دوره 10  شماره 

صفحات  -

تاریخ انتشار 2002