level里面放置的主要是攻击者尝试利用系统的弱点以进课件.ppt

上传人(卖家):晟晟文业 文档编号:4569260 上传时间:2022-12-20 格式:PPT 页数:14 大小:201.50KB
下载 相关 举报
level里面放置的主要是攻击者尝试利用系统的弱点以进课件.ppt_第1页
第1页 / 共14页
level里面放置的主要是攻击者尝试利用系统的弱点以进课件.ppt_第2页
第2页 / 共14页
level里面放置的主要是攻击者尝试利用系统的弱点以进课件.ppt_第3页
第3页 / 共14页
level里面放置的主要是攻击者尝试利用系统的弱点以进课件.ppt_第4页
第4页 / 共14页
level里面放置的主要是攻击者尝试利用系统的弱点以进课件.ppt_第5页
第5页 / 共14页
点击查看更多>>
资源描述

1、A Structural Framework for Modeling Multi-Stage Network AttacksDaley,Larson,DawkinsUniversity of Tulsa2002 IEEEOutlineIntroductionStratified Node TopologylAttack Node CorrelationlContext Sensitive NodesExample Attack ScenariosApplicationsRelated WorkConclusionsIntroductionAttack trees represent goal

2、-oriented attack behaviors lmultistagelcasual relationships between events or statesl“AND”,“OR”lnodes can be weighted to reflect the likelihood of success for a particular attackIntroduction(cont.)Disadvantageldo not provide a comprehensive model for the analysis of network vulnerabilityExtended att

3、ack tree paradigmlintroduce functionality to allow for a comprehensive representation of attacklstratified node topologyevent-level,state-level,top-level nodesStratified Node Topology(SNT)Stratified Node TopologyThree layers partition attack tree based on functionality and allow for a more precise p

4、ortrayal of the mechanics of an attack.Event-Levelldirect activities of an attackerlnodes correspond directly to intrusion detection system alertsStratified Node Topology(cont.)State-Levellgeneralized intermediate objectives in an attacklconceptual steps(abstract goals)lfairly constantlex:“execute a

5、rbitrary code”,“modify protected file”Top-Levellultimate intentions of an attackerltop-level nodes may also be starting points for other attacksAttack Node Correlationrelationship between nodeslimplicit linkallow individual nodes in the tree to imply another nodeex:perform a buffer overflow exploit

6、to execute arbitrary codelexplicit linkwhen an attack provides a capability to execute additional nodes but does not actually invoke an instance of a new nodeex:obtain root access,next to compromise additional systems or steal informationContext Sensitive NodesAssign parameter values to attack nodel

7、bound the search space of attackslreduce the likelihood of false positivesExample Attack ScenariosExample Attack Scenarios(cont.)The composable goal-oriented behavior of the Stratified Node Topology lends the ability to describe the events that enable an attack.ApplicationsTo express this model,two

8、languages have been designed:lAttack Modeling Language(AML)express requirements and results of attackrelationships between attackslNetwork Modeling Language(NML)An analytical vulnerability engine utilizes NML specifications in conjunction with AML definitions to construct vulnerability attack trees.

9、Related WorkIDIOT project ladaptation of Colored Petri Netslview a single attack as a pattern of states rather than linking multiple attacks togetherlthis tool was not meant for attack correlation across a networkConclusionsThe modeling framework classify multistage network attacks in a composable,functional structureThe approach provides a method for correlating attacks and expressing the capabilities they permit

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 办公、行业 > 各类PPT课件(模板)
版权提示 | 免责声明

1,本文(level里面放置的主要是攻击者尝试利用系统的弱点以进课件.ppt)为本站会员(晟晟文业)主动上传,163文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。
2,用户下载本文档,所消耗的文币(积分)将全额增加到上传者的账号。
3, 若此文所含内容侵犯了您的版权或隐私,请立即通知163文库(发送邮件至3464097650@qq.com或直接QQ联系客服),我们立即给予删除!


侵权处理QQ:3464097650--上传资料QQ:3464097650

【声明】本站为“文档C2C交易模式”,即用户上传的文档直接卖给(下载)用户,本站只是网络空间服务平台,本站所有原创文档下载所得归上传人所有,如您发现上传作品侵犯了您的版权,请立刻联系我们并提供证据,我们将在3个工作日内予以改正。


163文库-Www.163Wenku.Com |网站地图|