Connected Components and Credential Hopping in Authentication Graphs

被引:7
|
作者
Hagberg, Aric [1 ]
Lemons, Nathan [1 ]
Kent, Alex [2 ]
Neil, Joshua [2 ]
机构
[1] Los Alamos Natl Lab, Div Theoret, Ctr Nonlinear Studies, Los Alamos, NM 87545 USA
[2] Los Alamos Natl Lab, Adv Comp Solut, Los Alamos, NM 87545 USA
关键词
RANDOM INTERSECTION GRAPHS;
D O I
10.1109/SITIS.2014.95
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Modern enterprise computer networks rely on centrally managed authentication schemes that allow users to easily communicate access credentials to many computer systems and applications. The authentication events typically consist of a user connecting to a computer with an authorized credential. These credentials are often cached on the application servers which creates a risk that they may be stolen and used to hop between computers in the network. We examine computer network risk associated with credential hopping by creating and studying the structure of the authentication graph, a bipartite graph built from authentication events. We assume that an authentication graph with many short paths between computers represents a network that is more vulnerable to such attacks. Under this natural assumption, we use a measure of graph connectivity, namely the size of the largest connected component, to give a quantitative indicator of the network's susceptibility to such attacks. Motivated by graph theoretical results for component sizes in random intersection graphs, we propose a mitigation strategy, and perform experiments simulating an implementation using data from a large enterprise network. The results lead to realistic, actionable risk reduction strategies. To facilitate continued research opportunities we are also providing our authentication bipartite graph data set spanning 9 months and 708 million time-series edge records.
引用
收藏
页码:416 / 423
页数:8
相关论文
共 50 条
  • [21] Connected components of big graphs in fixed MapReduce rounds
    Reihane Abdolazimi
    Hassan Naderi
    Masoud Sagharichian
    Cluster Computing, 2017, 20 : 2563 - 2574
  • [22] A New Parallel Algorithm for Connected Components in Dynamic Graphs
    McColl, Robert
    Green, Oded
    Bader, David A.
    2013 20TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING (HIPC), 2013, : 246 - 255
  • [23] Decomposing infinite 2-connected graphs into 3-connected components
    Richter, RB
    ELECTRONIC JOURNAL OF COMBINATORICS, 2004, 11 (01):
  • [24] Stronger Authentication for Password Credential Internet Services
    Booth, Todd
    Andersson, Karl
    PROCEEDINGS OF THE 2017 THIRD INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2017,
  • [25] Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication
    Yang, Yanjiang
    Lu, Haibing
    Liu, Joseph K.
    Weng, Jian
    Zhang, Youcheng
    Zhou, Jianying
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 141 - 151
  • [26] Structure and enumeration of two-connected graphs with prescribed three-connected components
    Gagarin, Andrei
    Labelle, Gilbert
    Leroux, Pierre
    Walsh, Timothy
    ADVANCES IN APPLIED MATHEMATICS, 2009, 43 (01) : 46 - 74
  • [27] Max-min partitioning of grid graphs into connected components
    Becker, R
    Lari, I
    Lucertini, M
    Simeone, B
    NETWORKS, 1998, 32 (02) : 115 - 125
  • [28] Object Recognition in Floor Plans by Graphs of White Connected Components
    Barducci, Alessio
    Marinai, Simone
    2012 21ST INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR 2012), 2012, : 298 - 301
  • [29] Learning Graphs With Monotone Topology Properties and Multiple Connected Components
    Pavez, Eduardo
    Egilmez, Hilmi E.
    Ortega, Antonio
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2018, 66 (09) : 2399 - 2413
  • [30] A study of connectivity on dynamic graphs: computing persistent connected components
    Mathilde Vernet
    Yoann Pigné
    Éric Sanlaville
    4OR, 2023, 21 : 205 - 233