Model-Based Vulnerability Analysis of Computer Systems
نویسندگان
چکیده
Vulnerability analysis is concerned with the problem of identifying weaknesses in computer systems that can be exploited to compromise their security. Most vulnerabilities arise from unexpected interactions between di erent system components such as server processes, lesystem permissions and content, and other operating system services. Existing vulnerability techniques (such as those used in COPS and SATAN) are based on enumerating the known causes of vulnerabilities in the system and capturing these causes in the form of rules, e.g., a worldor group-writable .login le is a well known vulnerability that enables one user to gain all access privileges of another user. However, the generation of the rules relies on expert knowledge about interactions among many components of the system. Issues such as system complexity, race conditions, many possible interleavings, hidden assumptions etc. make it very hard even for experts to come up with all such rules. In contrast, we propose a new model-based approach where the security-related behavior of each system component is modeled in a high-level speci cation language such as CSP or CCS. These component models can then be composed to obtain all possible behaviors of the entire system. Finding system vulnerabilities can now be accomplished by analyzing these behaviors using automated veri cation techniques (model checking in particular) to identify scenarios where security-related properties (such as maintaining integrity of password les) are violated. In contrast to previous approaches that mainly address well-known vulnerabilities, our model-based approach has the potential to automatically seek out and identify known and as-yet-unknown vulnerabilities.
منابع مشابه
A Petri-net based modeling tool, for analysis and evaluation of computer systems
Petri net is one of the most popular methods in modeling and evaluation of concurrent and event-based systems. Different tools have been created to support modeling and simulation of different extensions of Petri net in different applications. Each tool supports some extensions and some features. In this work a Petri net based modeling and evaluation tool is presented that not only supports dif...
متن کاملAssessing the Vulnerability of the Land Using the IDI Combination Model in Arid and Semi arid Regions (Khorasan Razavi)
Land vulnerability one of the major global challenges as an objective case of degradation of arid, semi-arid and semi-humid ecosystems caused by natural processes and human activities. However, in order to assess the vulnerability of the land, it is necessary to know exactly the degree of tolerance of ecosystems and the use of indigenous knowledge systems to external conditions.The present stud...
متن کاملDamping analysis of sub-synchronous resonance (SSR) in a wind farm based on DFIG in a series compensated network
The effect of wind generator on sub-synchronous resonance (SSR) is being interested by increasing penetration of wind turbine in power systems,. Purpose of this article is to analyze SSR in a wind farm based on doubly fed induction generator (DFIG) which is connected to compensating series grid. A dynamic model for analysis of induction generator effect and Torsional Interaction (TI) has been u...
متن کاملEmpirical Seismic Vulnerability and Damage of Bottom Frame Seismic Wall Masonry Structure: A Case Study in Dujiangyan (China) Region
In order to understand the seismic performance and mechanism of bottom frame seismic wall masonry structure (BFSWMS) and its vulnerability in empirical seismic damage, based on the statistical and numerical analysis of the field seismic damage observation data of 2178 Dujiangyan structures in the Wenchuan great earthquake urban of China on May 12, 2008, a non-linear function model between the s...
متن کاملFormal approach on modeling and predicting of software system security: Stochastic petri net
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...
متن کاملAssessment of Seismic Vulnerability in Urban and Rural Health Service Centers of Hamadan Province Using Geographic Information Systems
Background: Maintaining the performance of healthcare centers during an earthquake is essential. Evaluating the seismic vulnerability of these centers is a priority. This study aims to evaluate seismic vulnerability using geographic information systems (GIS) in urban and rural health service centers of Hamadan Province, Iran, in 2021. Materials and Methods: This is a descriptive, analytical cr...
متن کامل