Architecture-Based Attack Path Analysis for Identifying Potential Security Incidents

被引:1
|
作者
Walter, Maximilian [1 ]
Heinrich, Robert [1 ]
Reussner, Ralf [1 ]
机构
[1] Karlsruhe Inst Technol KIT, KASTEL Inst Informat Secur & Dependabil, Karlsruhe, Germany
来源
关键词
Attack Propagation; Software Architecture; Attack Path;
D O I
10.1007/978-3-031-42592-9_3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Analyzing attacks and potential attack paths can help to identify and avoid potential security incidents. Manually estimating an attack path to a targeted software element can be complex since a software system consists of multiple vulnerable elements, such as components, hardware resources, or network elements. In addition, the elements are protected by access control. Software architecture describes the structural elements of the system, which may form elements of the attack path. However, estimating attack paths is complex since different attack paths can lead to a targeted element. Additionally, not all attack paths might be relevant since attack paths can have different properties based on the attacker's capabilities and knowledge. We developed an approach that enables architects to identify relevant attack paths based on the software architecture. We created a metamodel for filtering options and added support for describing attack paths in an architectural description language. Based on this metamodel, we developed an analysis that automatically estimates attack paths using the software architecture. This can help architects to identify relevant attack paths to a targeted component and increase the system's overall security. We evaluated our approach on five different scenarios. Our evaluation goals are to investigate our analysis's accuracy and scalability. The results suggest a high accuracy and good runtime behavior for smaller architectures.
引用
收藏
页码:37 / 53
页数:17
相关论文
共 50 条
  • [41] Analysis of potential attack scenarios for systems with ieee STD 1149.1 security extension
    Biasizzo, Anton
    INFORMACIJE MIDEM-JOURNAL OF MICROELECTRONICS ELECTRONIC COMPONENTS AND MATERIALS, 2007, 37 (03): : 146 - 151
  • [42] Model-driven architecture based security analysis
    Mili, Saoussen
    Nguyen, Nga
    Chelouah, Rachid
    SYSTEMS ENGINEERING, 2021, 24 (05) : 307 - 321
  • [43] Analysis on the Security Architecture of ZigBee Based on IEEE 802.15.4
    Fan, Bo
    2017 IEEE 13TH INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS (ISADS 2017), 2017, : 241 - 246
  • [44] Reliability and Performance Analysis of Architecture-Based Software Implementing Restarts and Retries Subject to Correlated Component Failures
    Li, Xiao-Dan
    Yin, Yong-Feng
    Fiondella, Lance
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2015, 25 (08) : 1307 - 1334
  • [45] Identifying Security Requirements Based on Linguistic Analysis and Machine Learning
    Li, Tong
    2017 24TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2017), 2017, : 388 - 397
  • [46] Recognizing Intrusive Intention and Assessing Threat Based on Attack Path Analysis
    Peng Wu
    Yao Shuping
    Chen Junhua
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 450 - +
  • [47] Modeling and Analysis of Security Incidents for Mobile Communication Mesh Zigbee-Based Network
    Desnitsky, V. A.
    Kotenko, I. V.
    PROCEEDINGS OF 2017 XX IEEE INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM), 2017, : 500 - 502
  • [48] Security Attack Prediction Based on User Sentiment Analysis of Twitter Data
    Hernandez, Aldo
    Sanchez, Victor
    Sanchez, Gabriel
    Perez, Hector
    Olivares, Jesus
    Toscano, Karina
    Nakano, Mariko
    Martinez, Victor
    PROCEEDINGS 2016 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2016, : 610 - 617
  • [49] Exploiting token and path-based representations of code for identifying security-relevant commits
    Ram, Achyudh
    Xin, Ji
    Nagappan, Meiyappan
    Yu, Yaoliang
    Lozoya, Rocío Cabrera
    Sabetta, Antonino
    Lin, Jimmy
    arXiv, 2019,
  • [50] Attack-Defense Trees based Cyber Security Analysis for CPSs
    Ji, Xiang
    Yu, HuiQun
    Fan, GuiSheng
    Fu, WenHao
    2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 693 - 698