Architecture-Based Attack Path Analysis for Identifying Potential Security Incidents

被引:1
|
作者
Walter, Maximilian [1 ]
Heinrich, Robert [1 ]
Reussner, Ralf [1 ]
机构
[1] Karlsruhe Inst Technol KIT, KASTEL Inst Informat Secur & Dependabil, Karlsruhe, Germany
来源
关键词
Attack Propagation; Software Architecture; Attack Path;
D O I
10.1007/978-3-031-42592-9_3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Analyzing attacks and potential attack paths can help to identify and avoid potential security incidents. Manually estimating an attack path to a targeted software element can be complex since a software system consists of multiple vulnerable elements, such as components, hardware resources, or network elements. In addition, the elements are protected by access control. Software architecture describes the structural elements of the system, which may form elements of the attack path. However, estimating attack paths is complex since different attack paths can lead to a targeted element. Additionally, not all attack paths might be relevant since attack paths can have different properties based on the attacker's capabilities and knowledge. We developed an approach that enables architects to identify relevant attack paths based on the software architecture. We created a metamodel for filtering options and added support for describing attack paths in an architectural description language. Based on this metamodel, we developed an analysis that automatically estimates attack paths using the software architecture. This can help architects to identify relevant attack paths to a targeted component and increase the system's overall security. We evaluated our approach on five different scenarios. Our evaluation goals are to investigate our analysis's accuracy and scalability. The results suggest a high accuracy and good runtime behavior for smaller architectures.
引用
收藏
页码:37 / 53
页数:17
相关论文
共 50 条
  • [31] Common Factor Analysis of Information Security Incidents Based on Psychological Factors
    Tanimoto, Shigeaki
    Suzuki, Takumi
    Hatashima, Takashi
    Kanai, Atsushi
    ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2022, 2022, 526 : 248 - 257
  • [32] Quantitative analysis of information leakage in service-oriented architecture-based Web services
    Anjaria, Kushal
    Mishra, Arun
    KYBERNETES, 2017, 46 (03) : 479 - 500
  • [33] A Logic-based Attack Graph for Analyzing Network Security Risk Against Potential Attack
    Yi, Feng
    Cai, Huang Yi
    Xin, Fu Zheng
    2018 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), 2018,
  • [34] Architecture-based change impact analysis in cross-disciplinary automated production systems
    Heinrich, Robert
    Koch, Sandro
    Cha, Suhyun
    Busch, Kiana
    Reussner, Ralf
    Vogel-Heuser, Birgit
    JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 146 : 167 - 185
  • [35] Development of Donor-Acceptor Architecture-Based Potential Theranostic Fluorescent Probes for Alzheimer's Disease
    Bajad, Nilesh Gajanan
    Gajendra, T. A.
    Sharma, Khushboo
    Tapadia, Madhu G.
    Kumar, Ashok
    Krishnamurthy, Sairam
    Singh, Sushil Kumar
    ACS CHEMICAL NEUROSCIENCE, 2025, 16 (07): : 1388 - 1401
  • [36] NETWORK SECURITY ANALYSIS BASED ON HOST-BASED ATTACK GRAPH
    Zhong, Shangqin
    Yao, Wenbin
    Ge, Haihui
    Yang, Yixian
    3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE (ITCS 2011), PROCEEDINGS, 2011, : 88 - +
  • [37] SABDTM: Security-first architecture-based dynamic trusted measurement scheme for operating system of the virtual computing node
    Huang, Haoxiang
    Zhang, Jianbiao
    Zhang, Lei
    Hu, Jun
    Cao, Yihao
    COMPUTERS & SECURITY, 2024, 137
  • [38] Researches on network security situation analysis based on attack states
    Lv, Huiying
    Cao, Yuanda
    Shi, Cuixia
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 640 - 646
  • [39] Network security analysis model based on the increase in attack ability
    Zhang, Haixia
    Su, Purui
    Feng, Dengguo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2007, 44 (12): : 2012 - 2019
  • [40] Complex Network Security Analysis based on Attack Graph Model
    Liu, Zhiming
    Li, Sheng
    He, Jin
    Xie, Di
    Deng, Zhantao
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 183 - 186