A Framework for Automated Identification of Attack Scenarios on IT Infrastructures

نویسندگان

  • Seyit Ahmet Çamtepe
  • Karsten Bsufka
  • Leonhard Hennig
  • Cihan Simsek
  • Sahin Albayrak
چکیده

Due to increased complexity, scale, and functionality of information and telecommunication (IT) infrastructures, every day new exploits and vulnerabilities are discovered. These vulnerabilities are most of the time used by malicious people to penetrate these IT infrastructures for mainly disrupting business or stealing intellectual properties. Current incidents prove that it is not sufficient anymore to perform manual security tests of the IT infrastructure based on sporadic security audits. Instead networks should be continuously tested against possible attacks. In this paper we present current results and challenges towards realizing automated and scalable solutions to identify possible attack scenarios in an IT infrastructure. Namely, we define an extensible framework which uses public vulnerability databases to identify probable multi-step attacks in an IT infrastructure, and provide recommendations in the form of patching strategies, topology changes, and configuration updates.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach

Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. In this paper a new IDS alert correlation method is proposed that can be used to detect attack scenarios in real-time. The proposed method is based on a causal approach due to the strength of causal methods in ...

متن کامل

Cyber Threats Foresight Against Iran Based on Attack Vector

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...

متن کامل

I-1: Screening of Subfertile Men for Testicularlar Carcinoma In Situ by An Automated Image Analysis-Based Cytological Test of The Ejaculate

Background: Testicular cancer (TC) is usually diagnosed after manifestation of an overt tumour. Tumour formation is preceded by a pre-invasive and asymptomatic stage, carcinoma in situ (CIS) testis, except for very rare subtypes. The CIS cells are located within seminiferous tubules but can be exfoliated and detected in ejaculates with specific CIS markers. Materials and Methods: We have built ...

متن کامل

Is my attack tree correct? Extended version

Attack trees are a popular way to represent and evaluate potential security threats on systems or infrastructures. The goal of this work is to provide a framework allowing to express and check whether an attack tree is consistent with the analyzed system. We model real systems using transition systems and introduce attack trees with formally specified node labels. We formulate the correctness p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Praxis der Informationsverarbeitung und Kommunikation

دوره 35  شماره 

صفحات  -

تاریخ انتشار 2012