Using SPIN and Eclipse for Optimized High-Level Modeling and Analysis of Computer Network Attack Models [UNPUBLISHED DRAFT]
نویسندگان
چکیده
Advanced network attacks utilize complex, intertwined sequences of events on different hosts instead of just plain vulnerability exploitations. These sequences may contain protocol execution steps, attacker, and administrator actions. We propose a SPIN based approach for formal modeling and analysis of such attack sequences in scenarios where both protocol and network level aspects are relevant. Our approach allows to automatically find typical attack sequences and not yet considered variants in such an environment. The development of scenario models is supported by a modeling framework and the use of the high-level process specification language cTLA. For the purpose of automated analysis, the powerful model-checking tool SPIN is employed and a compiler provides optimized translation of the cTLA model descriptions to Promela. The development of models and analysis experiments are further facilitated by integrating the tools into the Eclipse universal tool platform. We outline the principles of our approach and focus on modeling structure, optimized translation and tool integration.
منابع مشابه
Using SPIN and Eclipse for Optimized High-Level Modeling and Analysis of Computer Network Attack Models
Advanced attack sequences combine different kinds of steps (e.g. attacker, protocol, and administration steps) on multiple networked systems. We propose a SPIN based approach for formal modeling and analysis of such scenarios. Our approach is especially suited for scenarios were protocol and network level aspects matter simultaneously. Typical attack sequences and not yet considered variants ca...
متن کاملAlert correlation and prediction using data mining and HMM
Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, there emerged a recent track of security research, focused on alert correlation, which ext...
متن کاملPrediction of Mechanical Properties of TWIP Steels using Artificial Neural Network Modeling
In recent years, great attention has been paid to the development of high manganese austenitic TWIP steels exhibiting high tensile strength and exceptional total elongation. Due to low stacking fault energy (SFE), cross slip becomes more difficult in these steels and mechanical twinning is then the favored deformation mode besides dislocation gliding. Chemical composition along with processing ...
متن کاملIntegrated formal modeling and automated analysis of computer network attacks
In the field of formal modeling and analysis as related to computer network security, existing approaches are highly specialized towards either a protocol, node, or network view. Typically, they are even further specialized towards a specific subset of one view (e.g., a certain class of protocols, interactions of local node components, or network propagation of predefined vulnerabilities). Thus...
متن کاملGas Flow Metering Using the PSO Optimized Interval Type- 2 Fuzzy Neural Network
Orifice flow meter is one of the most common devices in industry which is used for measuring the gas flow. This system includes an orifice plate, temperature and pressure transmitters, and a flow computer. The flow computer is used for collecting information related to temperature, pressure, and their differences under various conditions. Also the flow computer can calculate the flow rate of ga...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005