Simulated Penetration Testing and Mitigation Analysis

نویسندگان

  • Michael Backes
  • Jörg Hoffmann
  • Robert Künnemann
  • Patrick Speicher
  • Marcel Steinmetz
چکیده

Penetration testing is a well-established practical concept for the identification of potentially exploitable security weaknesses and an important component of a security audit. Providing a holistic security assessment for networks consisting of several hundreds hosts is hardly feasible though without some sort of mechanization. Mitigation, prioritizing countermeasures subject to a given budget, currently lacks a solid theoretical understanding and is hence more art than science. In this work, we propose the first approach for conducting comprehensive what-if analyses in order to reason about mitigation in a conceptually well-founded manner. To evaluate and compare mitigation strategies, we use simulated penetration testing, i.e., automated attack-finding, based on a network model to which a subset of a given set of mitigation actions, e.g., changes to the network topology, system updates, configuration changes etc. is applied. We determine optimal combinations that minimize the maximal attacker success (similar to a Stackelberg game), and thus provide a well-founded basis for a holistic mitigation strategy. We show that these what-if analysis models can largely be derived from network scan, public vulnerability databases and manual inspection with various degrees of automation and detail, and we simulate mitigation analysis on networks of different size and vulnerability.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Strategies for Mitigating the Reduction in Economic Value of Variable Generation with Increasing Penetration Levels

Executive Summary Overview Previously, Mills and Wiser [2012] found a decline in the marginal economic value of different variable generation (VG) technologies with increasing penetration levels. Economic value in this case is primarily based on the avoided costs form other non-renewable power plants in the power system including capital investment cost, variable fuel, and variable operations a...

متن کامل

Penetration Testing and Mitigation of Vulnerabilities Windows Server

Cyber attack has become a major concern over the past few years. While the technical capability to attack has declined, hacking tools both simple and comprehensive are themselves evolving rapidly. Certain approaches are necessary to protect a system from cyber threats. This work engages with comprehensive penetration testing in order to find vulnerabilities in the Windows Server and exploit the...

متن کامل

Engineering of core/shell nanoparticles surface plasmon for increasing of light penetration depth in tissue (modeling and analysis)

Objectives: In this article, a new procedure for increasing the light penetration depth in a tissue is studied and simulated. It has been reported that the most important problem in biomedical optical imaging relates to the light penetration depth, and so this makes a dramatic restriction on its applications. In the optical imaging method, the detection of the backscattered pho...

متن کامل

Towards Side-Effects-free Database Penetration Testing

Penetration testing is one of the most traditional and widely used techniques to detect security flaws in systems by conducting simulated-attacks to the target systems. Organizations can develop a tool based on this technique to assess their own security systems or use third party softwares. However, besides its advantages in exploring real security vulnerabilities without false results, this t...

متن کامل

Optimal Nonlinear Energy Sinks in Vibration Mitigation of the Beams Traversed by Successive Moving Loads

Optimal Nonlinear Energy Sink (NES) is employed in vibration suppression of the beams subjected to successive moving loads in this paper. As a real application, a typical railway bridge is dynamically modeled by a single-span beam and a traveling high-speed train is simulated by a series of successive moving loads. Genetic algorithm is employed as the optimization technique and optimal paramete...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1705.05088  شماره 

صفحات  -

تاریخ انتشار 2017