A Kolmogorov Complexity Approach for Measuring Attack Path Complexity By Nwokedi C. Idika & Bharat Bhargava Presented by Bharat Bhargava.

Slides:



Advertisements
Similar presentations
Answering Approximate Queries over Autonomous Web Databases Xiangfu Meng, Z. M. Ma, and Li Yan College of Information Science and Engineering, Northeastern.
Advertisements

Extending Q-Grams to Estimate Selectivity of String Matching with Low Edit Distance [1] Pirooz Chubak May 22, 2008.
Comparative Succinctness of KR Formalisms Paolo Liberatore.
A Unified Framework for Measuring a Network’s Mean Time-to-Compromise
Longest Common Subsequence
~1~ Infocom’04 Mar. 10th On Finding Disjoint Paths in Single and Dual Link Cost Networks Chunming Qiao* LANDER, CSE Department SUNY at Buffalo *Collaborators:
H.W. Chan, CSE Dept., CUHK1 Quantitative Evaluation for Operational Security - an Experiment [Ortalo et al., IEEE Transactions on Software Engineering,
Sheng Xiao, Weibo Gong and Don Towsley,2010 Infocom.
1 Measuring Network Security Using Attack Graphs Anoop Singhal National Institute of Standards and Technology Coauthors: Lingyu Wang and Sushil Jajodia.
Operational Definitions In our last class, we discussed (a) what it means to quantify psychological variables and (b) the different scales of measurement.
Farnoush Banaei-Kashani and Cyrus Shahabi Criticality-based Analysis and Design of Unstructured P2P Networks as “ Complex Systems ” Mohammad Al-Rifai.
Optimal Partitions of Strings: A new class of Burrows-Wheeler Compression Algorithms Raffaele Giancarlo Marinella Sciortino
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
CUSTOMER NEEDS ELICITATION FOR PRODUCT CUSTOMIZATION Yue Wang Advisor: Prof. Tseng Advanced Manufacturing Institute Hong Kong University of Science and.
Complexity 7-1 Complexity Andrei Bulatov Complexity of Problems.
Complexity 15-1 Complexity Andrei Bulatov Hierarchy Theorem.
Complexity 11-1 Complexity Andrei Bulatov Space Complexity.
1 Software Testing and Quality Assurance Lecture 33 – Software Quality Assurance.
Centrality and Prestige HCC Spring 2005 Wednesday, April 13, 2005 Aliseya Wright.
Complexity 5-1 Complexity Andrei Bulatov Complexity of Problems.
Software Metrics II Speaker: Jerry Gao Ph.D. San Jose State University URL: Sept., 2001.
Computing the Banzhaf Power Index in Network Flow Games
Dean H. Lorenz, Danny Raz Operations Research Letter, Vol. 28, No
Optimal Partitions of Strings: A new class of Burrows-Wheeler Compression Algorithms Raffaele Giancarlo Marinella Sciortino
Intelligent System Lab. (iLab) Southern Taiwan University of Science and Technology 1 Estimation of Item Difficulty Index Based on Item Response Theory.
Introduction to Network Defense
1 Security Risk Analysis of Computer Networks: Techniques and Challenges Anoop Singhal Computer Security Division National Institute of Standards and Technology.
1 Chapter 8 The Discrete Fourier Transform 2 Introduction  In Chapters 2 and 3 we discussed the representation of sequences and LTI systems in terms.
Infinite Series Objective: We will try to find the sum of a series with infinitely many terms.
1 Oppliger: Ch. 15 Risk Management. 2 Outline Introduction Formal risk analysis Alternative risk analysis approaches/technologies –Security scanning –Intrusion.
Evaluation of software engineering. Software engineering research : Research in SE aims to achieve two main goals: 1) To increase the knowledge about.
Resistant Learning on the Envelope Bulk for Identifying Anomalous Patterns Fang Yu Department of Management Information Systems National Chengchi University.
CSC312 Automata Theory Lecture # 2 Languages.
An Improved Algorithm to Accelerate Regular Expression Evaluation Author: Michela Becchi, Patrick Crowley Publisher: 3rd ACM/IEEE Symposium on Architecture.
Basic Concepts in Number Theory Background for Random Number Generation 1.For any pair of integers n and m, m  0, there exists a unique pair of integers.
1 Combinatorial Algorithms Parametric Pruning. 2 Metric k-center Given a complete undirected graph G = (V, E) with nonnegative edge costs satisfying the.
The Application of The Improved Hybrid Ant Colony Algorithm in Vehicle Routing Optimization Problem International Conference on Future Computer and Communication,
Operational Definitions In our last class, we discussed (a) what it means to quantify psychological variables and (b) the different scales of measurement.
Evaluating Network Security with Two-Layer Attack Graphs Anming Xie Zhuhua Cai Cong Tang Jianbin Hu Zhong Chen ACSAC (Dec., 2009) 2010/6/151.
Quantifying Knowledge Fouad Chedid Department of Computer Science Notre Dame University Lebanon.
An overview of multi-criteria analysis techniques The main role of the techniques is to deal with the difficulties that human decision-makers have been.
MODEL FOR DEALING WITH DUAL-ROLE FACTORS IN DEA: EXTENSIONS GONGBING BI,JINGJING DING,LIANG LIANG,JIE WU Presenter : Gongbing Bi School of Management University.
Maximizing Network Security Given a Limited Budget Nwokedi C. Idika, Brandeis H. Marshall, Bharat K. Bhargava Advisor : Professor Frank Y.S. Lin Presented.
Optimal Resource Allocation for Protecting System Availability against Random Cyber Attack International Conference Computer Research and Development(ICCRD),
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Ravello, Settembre 2003Indexing Structures for Approximate String Matching Alessandra Gabriele Filippo Mignosi Antonio Restivo Marinella Sciortino.
A Scalable Architecture For High-Throughput Regular-Expression Pattern Matching Yao Song 11/05/2015.
Calculating frequency moments of Data Stream
CS 208: Computing Theory Assoc. Prof. Dr. Brahim Hnich Faculty of Computer Sciences Izmir University of Economics.
OPTIMAL CONNECTIONS: STRENGTH AND DISTANCE IN VALUED GRAPHS Yang, Song and David Knoke RESEARCH QUESTION: How to identify optimal connections, that is,
Module #10: Proof Strategies Rosen 5 th ed., §3.1 (already covered)
A Linear Time Algorithm for the Longest Path Problem on 2-trees joint work with Tzvetalin Vassilev and Krassimir Manev
Finding Regular Simple Paths Sept. 2013Yangjun Chen ACS Finding Regular Simple Paths in Graph Databases Basic definitions Regular paths Regular simple.
Onlinedeeneislam.blogspot.com1 Design and Analysis of Algorithms Slide # 1 Download From
Network Partition –Finding modules of the network. Graph Clustering –Partition graphs according to the connectivity. –Nodes within a cluster is highly.
Graph Indexing From managing and mining graph data.
More on HMMs and Multiple Sequence Alignment BMI/CS 776 Mark Craven March 2002.
RESEARCH METHODS Lecture 8. REVIEW OF LITERATURE.
Based on Rosen, Discrete Mathematics & Its Applications, 5e Prepared by (c) Michael P. Frank Modified by (c) Haluk Bingöl 1/18 Module.
© 2013 Goodrich, Tamassia, Goldwasser
Lecture 7 Functions.
Rosen 5th ed., §3.2 ~9 slides, ~½ lecture
A Kolmogorov Complexity Approach for Measuring Attack Path Complexity
A Kolmogorov Complexity Approach for Measuring Attack Path Complexity
CH 9.2 : Hash Tables Acknowledgement: These slides are adapted from slides provided with Data Structures and Algorithms in C++, Goodrich, Tamassia and.
The aim of education is to teach students how to think rather than what to think. Sets The set is the fundamental discrete structure on which all other.
Rosen 5th ed., §3.2 ~9 slides, ~½ lecture
Discrete Mathematics and its Applications
Presentation transcript:

A Kolmogorov Complexity Approach for Measuring Attack Path Complexity By Nwokedi C. Idika & Bharat Bhargava Presented by Bharat Bhargava

Outline Motivation The Kolmogorov Complexity Method (KCM) The K-step Capability Accumulation Metric (KCA) Applying KCM to KCA

Motivation Perfect enterprise security is impossible to achieve, and must be approximated The difficulty associated with causing a security breach is used as an indicator of the quality of an enterprise’s security The ability of an attacker to exploit a vulnerability is referred to as exploitability

Exploitability is Important Common Vulnerability Scoring System (CVSS) exploitability is incorporated scoring of vulnerabilities Computer Emergency Response Team/ Coordination Center (CERT/CC) has a numeric score based exploitability SANS Critical Vulnerability Analysis Scale Rating 2 of its 4 ratings include exploitability Thus, assessing the difficulty of attack paths is important!

Representing Attack Paths with Attack Graphs Total Attack Paths: 4

Issues with Representation Counting the number of paths is straightforward (usually) Measuring the complexity of each attack is non- trivial Choices for determining attack complexity have been made in the literature However, these choices lack consistency, and fail to make some of the modeler’s assumptions explicit If security metrics will become more of a science, we will need a standard way of communicating our measurements!

What We Would Like A standard way of measuring attack path complexity that is grounded in some sound theory A attack path measurement approach that incorporates the assumptions of the modeler A way of measuring attack paths that provides a modeler sufficient flexibility to model the attack path as desired The Kolmogorov Complexity Method achieves these aims

Kolmogorov Complexity (KC) KC determines a string’s complexity by using the size of the smallest program that can produce that string Let K be a the function that returns the KC of a string Given strings x1 and x2, if K(x1) < K(x2), then x2 is more complex than x1 Idea: If we model attack paths as strings, we can apply KC to attack paths

Representing Attack Paths Alphabet A corresponds to the set of all exploits (i.e., instances of vulnerabilities) found in all attack graphs under consideration Constants ε is the empty string v i ∈ A denotes that an exploit from an attack graph ∅ corresponds to the empty set

Representing Attack Paths (II) Operators Let S and T be two strings composed of characters from A Let E 1 and E 2 be expressions in the language ST evaluates to the concatenation of strings S and T () provides priority ordering (S) + denotes that S may repeat one or more times

Representing Attack Paths (III) Operators (continued...) S k evaluates to k instances of S concatenated together E 1 [k] E 2 evaluates to the insertion of E 1 into index k of E 2 where the first character of E2 is index 0 (the above can be generalized to E 1 [k 1 ],[k2],...[kn] E 2 ) E 1 l,[k] E 2 concatenate E 1 l to E 2 and insert E 1 into the kth index of E 2 E 1 l[k] E 2 inserts E 1 l into the kth index of E 2

The Kolmogorov Complexity Method (KCM) Applied to an Attack Path Quantitative Representation: v 1 v 1 v 1 v 2 v 3 v 1 v 1 Qualitative Representations: v 1 3,2[2] v 2 v 3, v 1 3,[2] v 2 v 3 v 1, v 1 3 v 2 v 3 v 1 v 1 Each representation makes explicit distinct assumptions about the attack path

KCM Can Handle Cyclic Attack Paths A Representation: v 1 2 (v 1 v 2 v 3 )+v 1 2

Outline Motivation The Kolmogorov Complexity Method (KCM) The K-step Capability Accumulation Metric (KCA) Applying KCM to KCA

Previously Proposed Metrics Capability Metrics: measure security in terms of an attacker’s capability Number of Paths (Ortalo et al. ’99), Weakest Adversary (Pamula et al. ’06), Network Compromise Percentage (Lippmann et al. ’06) Complexity Metrics: measure security in terms of effort Shortest Path (Phillips & Swiler ’98), Mean of Path Lengths (Li & Vaughn ’06)

The K-Step Capability Accumulation Metric (KCA) KCA is a hybrid of a complexity metric and a capability metric More than how difficult it is to cause a security breach, or what capabilities can an attacker obtain, KCA is concerned with the amount of capability an attacker can attain for varying levels of attack effort Intuition: In general, a network that can be compromised in a single attack step is less secure than another network that requires a series of multiple attack steps to compromise the network

KCA: Comparing 2 Attack Graphs G1G1 G2G2 KCA 1 (G 1 ) = KCA 1 (G 2 ) KCA 2 (G 1 ) < KCA 2 (G 2 ) G 1 is more secure than G 2

Adapting KCA for KCM Assuming the KCM qualitative representation Cap p i (G) = ∪ capabilities(p i ) Let q 1 through q n be quantitative representations of the attack paths p 1 through p n respectively q j 0...i is the substring of q j from index 0 to index i q j i is the ith position of of q j

Adapting KCA for KCM (II) Similar definitions exist for s e(s j 0...i ) = q j 0...m, such that s j i = q j m and q j m ≠ q j m+1 also ∀ v ∈ q j 0...m, v ∈ s j 0...i This gives the following: KCA k (G) = ∪ i=1 k Cap e(s j 0...i ) (G), for all attack paths j

Summary We have proposed a methodology for measuring attack paths, the Kolmogorov Complexity Method (KCM) We have proposed a novel security metric that combines complexity and capabilities obtained by the attacker, the K-step Capability Accumulation Metric (KCA) We have shown that KCM can be applied to a security metric, namely, KCA

Thank You