Architecture-Based Attack Path Analysis for Identifying Potential Security Incidents

被引:1
|
作者
Walter, Maximilian [1 ]
Heinrich, Robert [1 ]
Reussner, Ralf [1 ]
机构
[1] Karlsruhe Inst Technol KIT, KASTEL Inst Informat Secur & Dependabil, Karlsruhe, Germany
来源
关键词
Attack Propagation; Software Architecture; Attack Path;
D O I
10.1007/978-3-031-42592-9_3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Analyzing attacks and potential attack paths can help to identify and avoid potential security incidents. Manually estimating an attack path to a targeted software element can be complex since a software system consists of multiple vulnerable elements, such as components, hardware resources, or network elements. In addition, the elements are protected by access control. Software architecture describes the structural elements of the system, which may form elements of the attack path. However, estimating attack paths is complex since different attack paths can lead to a targeted element. Additionally, not all attack paths might be relevant since attack paths can have different properties based on the attacker's capabilities and knowledge. We developed an approach that enables architects to identify relevant attack paths based on the software architecture. We created a metamodel for filtering options and added support for describing attack paths in an architectural description language. Based on this metamodel, we developed an analysis that automatically estimates attack paths using the software architecture. This can help architects to identify relevant attack paths to a targeted component and increase the system's overall security. We evaluated our approach on five different scenarios. Our evaluation goals are to investigate our analysis's accuracy and scalability. The results suggest a high accuracy and good runtime behavior for smaller architectures.
引用
收藏
页码:37 / 53
页数:17
相关论文
共 50 条
  • [21] Attack Intent Analysis Method Based on Attack Path Graph
    Li, Shijin
    Zhu, Minchen
    Qiu, Yanbin
    ICCNS 2018: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORK SECURITY, 2018, : 27 - 31
  • [22] Life cycle cost analysis at scale: a reference architecture-based approach
    Shaw, Conor
    Pereira, Flavia de Andrade
    Farghaly, Karim
    Hoare, Cathal
    Hartmann, Timo
    O'Donnell, James
    BUILT ENVIRONMENT PROJECT AND ASSET MANAGEMENT, 2024, 14 (05) : 713 - 733
  • [23] Architecture-based Change Impact Analysis in Information Systems and Business Processes
    Rostami, Kiana
    Heinrich, Robert
    Busch, Axel
    Reussner, Ralf
    2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE (ICSA 2017), 2017, : 179 - 188
  • [24] Software architecture-based analysis and testing: a look into achievements and future challenges
    Bertolino, Antonia
    Inverardi, Paola
    Muccini, Henry
    COMPUTING, 2013, 95 (08) : 633 - 648
  • [25] Impact of Potential-Induced Degradation on Different Architecture-Based Perovskite Solar Cells
    Purohit, Zeel
    Song, Wenya
    Carolus, Jorne
    Chaliyawala, Harsh
    Lammar, Stijn
    Merckx, Tamara
    Aernouts, Tom
    Tripathi, Brijesh
    Daenen, Michael
    SOLAR RRL, 2021, 5 (09)
  • [26] Enhancing Industrial Wireless Communication Security Using Deep Learning Architecture-Based Channel Frequency Response
    Alhoraibi, Lamia
    Alghazzawi, Daniyal
    Alhebshi, Reemah
    Nawaf, Liqaa F.
    Carroll, Fiona
    IET SIGNAL PROCESSING, 2024, 2024
  • [27] A MODEL CHECKER BASED APPROACH OF ATTACK PATH ENUMERATION FOR NETWORK SECURITY MANAGEMENT
    Bagchi, Atig
    Ghosh, S. K.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2009), VOLS 1 AND 2, 2009, : 1809 - 1816
  • [28] Evaluating method of security thread based on attack-path graph model
    University of Science and Technology Beijing, Beijing 100083, China
    不详
    不详
    Beijing Gongye Daxue Xuebao J. Beijing Univ. Technol., 2008, SUPPL. 2 (51-55):
  • [29] Alert Correlation Analysis Based on Attack Path Graph
    Zhang, Daojuan
    Qian, Kexiang
    Zhang, Peng
    Mao, Shu
    Wu, Hongbin
    2017 IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2017,
  • [30] SEACON: An Integrated Approach to the Analysis and Design of Secure Enterprise Architecture-Based Computer Networks
    Yadav, Surya B.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2008, 2 (01) : 1 - 25