2 DEVELOPMENT OF NEW
TAXONOMIC CHARACTERS
The basis for successful classification is appropriate
taxonomic characters (Simpson, 1961; Glass and
Vessey, 1995). Therefore, it is important for
improving existing vulnerability taxonomies to
extract new taxonomic characters.
2.1 Privilege Escalation
Through analyzing prevalent attack methods and
large numbers of vulnerabilities, we detect that most
vulnerabilities have the following characters: an
attacker in the low user-level L usually exploits a or
several vulnerabilities successfully to get a certain
privilege escalation, and then, arrives at the high
user-level H without authorization. Obviously, the
attacker’s illegal escalation from L to H seriously
threatens the security of computer system.
In the whole process of exploitation, an attacker
often plays a certain role of system user and owns
the corresponding user privilege-set. From a visitor
to a system use, finally to a system administrator, the
change of an attacker’s role reflects the variety in his
owning system resources, namely the variety in his
privileges. Therefore, based on the above practical
experiences and the idea that different roles of
system users have their privileges of different degree
in operating system design, this paper introduces a
new taxonomic character
the attribute of
‘privilege-set’. Definition 2.1 and 2.2 give separately
the concept of privilege, privilege-set (Pset) and
privilege escalation (P-E) (Wang, 2002).
Definition 2.1 A privilege is a (x,m). Where, x is
an object, m is a set of accessing modes of the
subject to that object and m isn’t null.
Pset={(xi,mi)|(xi,mi) is a privilege, i=1~n}. We use
Psubset to express any subset of Pset.
Definition 2.2 If a user ‘Name’ owning Pset
exploits a certain vulnerability to gain a new Pset’,
and,
∃
x’,m’
≠
, make (x’,m’)
∈
Pset’
∧
(x’,m’)
∉
Pset, then we argue that ‘Name’ makes a
privilege escalation.
To an attacker, he exploits vulnerabilities to
attack the computer system with the purpose of
obtaining much more privileges. On the other hand,
to a vulnerability, it is significant only if it gives an
attacker more privileges.
2.2 User-Pset Relationship
As for a certain subject (user or user’s process) in
system, its owning permissions which authorize it to
access all operable objects in system are a Pset.
Hence, every subject can be regarded as a naming
Pset. We can use (name,Pname) to express the
correspondence of a subject (user) to a Pset. Here,
‘name’ means a user’s name, and ‘Pname’ is the
corresponding Pset of name. To a user ‘name’ in
system, its default privilege-set is certain. So in the
condition of the legal access, (name,Pname) is
certain.
2.3 Classification of Psets
In (Longstaff, 1997), longstaff presents a taxonomy
to classify all visitors of computer, and he uses
Selection Decision Tree (SDT) to divide all visitor
into the following five classes: Remote using a
common service, Trusted system, User account,
Physical access and Privileged access. In this paper,
we use the above taxonomy of visitors for reference,
and from the other angle, combine visitors with Psets
to classify Psets of all possible users in system by
user’s roles. We also adopt the method of SDT to
make this classification. SDT for user’s role
classification is given in Figure 1.
Figure 1: Selection decision tree for user’s role
classification
In Figure 1, the current user is a broad
conception, and includes all possible users related to
the objective system, such as system accounts,
trusted or distrusted remote visitors, etc. Common
user is any system account except system
administrator. Table 1 shows the ranks and
A NEW VULNERABILITY TAXONOMY BASED ON PRIVILEGE ESCALATION
597