PORTUNES: Generating attack scenarios by finding ...

4 downloads 9942 Views 553KB Size Report
inconsistencies between security policies ... Insider threat analysis using information-centric modeling. In ... concern physical security, digital security and.
.

PORTUNES: Generating attack scenarios by finding inconsistencies between security policies Trajce Dimkov, Wolter Pieters, Pieter Hartel {trajce.dimkov,wolter.pieters,pieter.hartel}@utwente.nl Introduction

Solution

The security goals of an organization are implemented through security policies, which concern physical security, digital security and security awareness. Besides external actors, security policies are designed to thwart and malicious employees. This proves to be a hard task.

Portunes1,

Method

abstracts aspects from the three security areas and presents attack scenarios. A method applies graph-based algorithms on a Portunes models to generate attack scenarios.

 An employee can work in the same position for years before committing an attack, and has enough time to learn the security policies and their weaknesses;

Social Awareness

 An employee has a set of privileges for carrying out everyday tasks, allowing him physical access to various parts of the facility of an organization;  An employee has an established level of trust among his colleagues. Physical Security Unauthorized access Safety

Digital Security Confidentiality Integrity Availability

Security Awareness Social Engineering

Digital Security

Physical Security

Policy Policy

Safe Fence Door

Encryption Signature Firewall

Awareness Simulation Seminar

+

Fig 4. Portunes abstracts aspects from physical security, digital security and social awareness

Firstly, the building complex with the inventory of interest, the data and the people residing in the building are abstracted in a high-level Portunes model.

Attack scenario

Security Policies

Digital Mechanisms

+

►We define a formal model which combines aspects from physical security, digital security and security awareness of people in a single formalism. To present the model, a new KLAIM[1] inspired language is defined.

Fig 2. Using Portunes model, we are able to analyze an organization.

The outcome of the method is an attack scenario which leads to negating one of the security goals of the organization, without violating any policy. Policy

Physical Mechanisms

Contribution

Detailed Portunes model + Graph-based algorithms => Attack scenario

Graph + mapping function + constraints = Detailed Portunes model Fig 5. The high-level Portunes model is a tuple of a graph and mapping function which satisfies certain constraints.

Secondly, the high-level model is translated to a detailed model which is presented in Portunes’ language. The detailed model contains additional information on the security policies in place.

Fig 3. The resulting scenario is a set of distributed process definitions 1Inspired

Policy

from the Roman god of keys Policy

Fig 1. The organization defines security goals for the physical security of the buildings and the data. These goals are presented through security policies and enforced by various mechanisms.

Limitations

Policy

Portunes model + Portunes’ language => Detailed Portunes model

Problem Prediction of multi-step attacks from a malicious employee which uses a combination of credentials, physical access and social engineering to harm the organization.

 Validation - the Portunes model has been validated on small examples. Currently, we are performing a case study in an organization to properly validate the model.  Scalability - the current algorithms for calculating an attack scenario are of complexity O(|n4|) where n is number of nodes.

Fig 6. The detailed Portunes model is a formal language construct.

Finally, adapted graph-based algorithms analyze the detailed model and find inconsistencies in the security policies. As a result, the algorithms return an attack scenario which negates a given security goal of the organization.

►We are the first to produce attack scenarios which include physical and social aspects. This is achieved by using graph-based algorithms on the model to generate multi-step attack scenarios which do not violate any security policy in the organization. The main improvements of Portunes upon existing work are: 1. Expressing mobility of all objects, not just keys [2]; 2. Adaptation of graph-based vulnerability analysis on facilities and physical objects, not just on computer networks [3].

References [1] R. De Nicola, G. L. Ferrari, and R. Pugliese. KLAIM: A kernel language for agents interaction and mobility. IEEE Transactions on software engineering, 24(5):315–330,1998. [2] D. Ha, S. Upadhyaya, H. Ngo, S. Pramanik, and R. Chinchani. Insider threat analysis using information-centric modeling. In IFIP International Conference on Digital Forensics, pages 55– 73. Springer, 2007 [3] P. Ammann, D. Wijesekera, and S. Kaushik. Scalable, graphbased network vulnerability analysis. In CCS ’02, pages 217– 224. ACM, 2002.

This research is supported by the Sentinels program of the Technology Foundation STW, applied science division of NWO and the technology programme of the Ministry of Economic Affairs under project numberTIT.7628

Suggest Documents