5 CONCLUSION
The paper offered the approach and software tool for
security analysis of computer networks. The
approach possesses the following peculiarities: (1)
Usage of integrated family of different models based
on expert knowledge, including malefactor’s
models, multilevel models of attack scenarios,
building attack graph, security metrics computation
and security level evaluation; (2) Taking into
account diversity of malefactor’s positions,
intentions and experience levels; (3) Usage (during
construction of common attack graph) not only of
the parameters of computer network configuration,
but the rules of security policy used; possibility of
estimating the influence of different configuration
and policy data on the security level value; (4)
Taking into account not only attack actions (which
use vulnerabilities), but the common actions of
legitimate users and reconnaissance actions; (5)
Possibility of investigating various threats for
different network resources; (6) Possibility of
detection of bottlenecks (hosts and applications
responsible for the most serious attack actions,
routes and threats); (7) Possibility of querying the
system in the “what-if” way, for example, how the
general security level will change if the certain
parameter of network configuration or security
policy is changed or information about new
vulnerability is added; (8) Usage of updated
vulnerabilities databases (for example, Open Source
Vulnerability Database (OSVDB 2006); (9) Usage
of widespread CVSS approach (CVSS, 2006); (10)
Usage of qualitative techniques of risk analysis (in
particular, modified techniques of evaluating attack
criticality of SANS/GIAC and FRAP (FRAP, 2006).
The future research will be devoted to
comprehensive experimental assessment of offered
approach and improving the models of computer
attacks and security level evaluation.
This research is being supported by grant of
Russian Foundation of Basic Research (№ 04-01-
00167), grant of the Department for Informational
Technologies and Computation Systems of the
Russian Academy of Sciences (contract №3.2/03)
and partly funded by the EC as part of the POSITIF
project (contract IST-2002-002314).
REFERENCES
Cohen, F., 1999. Simulating Cyber Attacks, Defenses, and
Consequences. In IEEE Symposium on Security and
Privacy, Berkeley, CA.
CVSS, 2006. Common Vulnerability Scoring System.
Retrieved April 14, 2006, from
http://www.first.org/cvss/
Dantu, R., Loper, K., Kolan, P., 2004. Risk Management
using Behavior based Attack Graphs. In International
Conference on Information Technology: Coding and
Computing.
FRAP, 2006. Facilitated Risk Analysis Process. Retrieved
April 1, 2006, from http://www.peltierassociates.com/
Gorodetski, V., Kotenko, I., 2002. Attacks against
Computer Network: Formal Grammar-based
Framework and Simulation Tool. LNCS, V.2516.
Hariri, S., Qu, G., Dharmagadda, T., Ramkishore, M.,
Raghavendra, C. S., 2003. Impact Analysis of Faults
and Attacks in Large-Scale Networks. In IEEE
Security&Privacy, September/October.
Jha, S., Sheyner, O., Wing, J., 2002. Minimization and
reliability analysis of attack graphs. Technical Report
CMU-CS-02-109, Carnegie Mellon University.
Lye, K., Wing, J., 2005. Game Strategies in Network
Security. International Journal of Information
Security, February.
McNab, C., 2004. Network Security Assessment. O’Reilly
Media, Inc.
Noel, S., Jajodia, S., 2005. Understanding complex
network attack graphs through clustered adjacency
matrices. In Proc. 21st Annual Computer Security
Conference (ACSAC).
Netfilter, 2006. Netfilter/iptables documentation.
Retrieved April 14, 2006, from
http://www.netfilter.org/documentation/
NVD, 2006. National Vulnerability Database. Retrieved
April 14, 2006, from http://nvd.nist.gov/
NVD-Severity, 2006. National Vulnerability Database
Severity Ranking. Retrieved April 14, 2006, from
http://nvd.nist.gov/cvss.cfm
OSVDB, 2006. The Open Source Vulnerability Database.
Retrieved April 14, 2006, from http://www.osvdb.org/
Ou, X., Govindavajhala, S., Appel, A.W., 2005. MulVAL:
A Logic-based Network Security Analyzer. In 14th
Usenix Security Symposium.
Peltier, T.R., Peltier, J., Blackley, J.A., 2003. Managing a
Network Vulnerability Assessment. Auerbach Publ.
Positif, 2006. Positif Project. Retrieved June 8, 2006, from
http://www.positif.org/
Rieke, R., 2004. Tool based formal Modelling, Analysis
and Visualisation of Enterprise Network
Vulnerabilities utilising Attack Graph Exploration. In
Proceedings EICAR.
Ritchey, R. W., Ammann, P., 2000. Using model checking
to analyze network vulnerabilities. In
IEEE Symposium
on Security and Privacy.
Rothmaier, G., Krumm, H., 2005. A Framework Based
Approach for Formal Modeling and Analysis of Multi-
level Attacks in Computer Networks. LNCS, Vol.3731.
Sheyner, O., Haines, J., Jha, S., etc., 2002. Automated
generation and analysis of attack graphs. In IEEE
Symposium on Security and Privacy.
Schneier, B., 1999. Attack Trees. Dr. Dobb’s Journal,
Vol.12.
SECRYPT 2006 - INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY
344