Model-Based Analysis of Configuration Vulnerabilities
ثبت نشده
چکیده
Vulnerability analysis is concerned with the problem of identifying weaknesses in computer systems that can be exploited to compromise their security. In this paper we describe a new approach to vulnerability analysis based on model checking. Our approach involves: • Formal specification of desired security properties. An example of such a property is “no ordinary user can overwrite system log files.” • An abstract model of the system that captures its security-related behaviors. This model is obtained by composing models of system components such as the file system, privileged processes, etc. • Verification techniques to check whether the abstract model satisfies the security properties. This approach can be used to automatically detect known and as-yet-unknown vulnerabilities. This is in contrast with approaches such as those used in COPS and SATAN, which mainly address previously exploited vulnerabilities. Another advantage of our approach is that it is modular. For instance, to identify system vulnerabilities after addition of a server program, we only need to develop a model for the new server; the reanalysis of the system is done automatically. Traditional model checkers can analyze only finite-state systems. Finite-state models cannot capture components such as file systems where files can be added, renamed or removed. Hence finite-state techniques cannot be used to detect vulnerabilities that depend on file names, contents, or directory structures. In our approach, we permit infinite-state models by developing an alternative model checking technique that exploits the nature of vulnerabilities. We demonstrate the usefulness of this technique by showing how it detects nontrivial vulnerabilities in a simplified model of a Unix system.
منابع مشابه
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a fact, exploiting most of vulnerabilities result in access rights alteration. In this paper, we propose a new vulnerability analysis method based on the Take-Grant protection model. We extend the initial TakeGrant model...
متن کاملAn Integrated Closed-loop Supply Chain Configuration Model and Supplier Selection based on Offered Discount Policies
In this paper, a mathematical programming model is presented for integrated problem of closed loop supply chain network design and supplier selection. The suppliers propose discount policy based on purchase amount and loyalty of buyers which are both taken from the elements of RFM (Recency, Frequency and Monetary) technique. The main objective of this paper which is formulated by a mixed-integ...
متن کاملThe recognition of the necessity of for community-based disaster risk management to reduce the risk of vulnerability to earthquake disaster (case study: YousefAbad neighborhood of Tehran)
Disaster management and current attitudes in this area only focus on this areachr('39')s physical vulnerabilities, raising urban residentschr('39') exposure to these challenges in front of the earthquake. On the other hand, Incidental actions include reducing the vulnerability and the physical strengthening and promotion of poor organization during the disaster; they ignored the capabilities an...
متن کاملModification of exponential based hyperelastic strain energy to consider free stress initial configuration and Constitutive modeling
In this research, the exponential stretched based hyperelastic strain energy was modified to provide the unstressed initial configuration. To this end, as the first step, the model was calibrated by the experimental data to find the best material parameters. The fitting results indicated material stability in large deformations and basic loading modes. In the second step, the initial pseudo str...
متن کاملVulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities
Modeling and analyzing information system vulnerabilities help predict possible attacks to computer networks using vulnerabilities information and the network configuration. In this paper, we propose a comprehensive approach to analyze network vulnerabilities in order to answer the safety problem focusing on vulnerabilities. The approach which is called Vulnerability Take Grant (VTG) is a graph...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000