Attack Planning in the Real World

06/18/2013
by   Jorge Lucangeli Obes, et al.
0

Assessing network security is a complex and difficult task. Attack graphs have been proposed as a tool to help network administrators understand the potential weaknesses of their network. However, a problem has not yet been addressed by previous work on this subject; namely, how to actually execute and validate the attack paths resulting from the analysis of the attack graph. In this paper we present a complete PDDL representation of an attack model, and an implementation that integrates a planner into a penetration testing tool. This allows to automatically generate attack paths for penetration testing scenarios, and to validate these attacks by executing the corresponding actions -including exploits- against the real target network. We present an algorithm for transforming the information present in the penetration testing tool to the planning domain, and show how the scalability issues of attack graphs can be solved using current planners. We include an analysis of the performance of our solution, showing how our model scales to medium-sized networks and the number of actions available in current penetration testing tools.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/30/2013

Automated Attack Planning

Penetration Testing is a methodology for assessing network security, by ...
research
06/17/2013

An Algorithm to Find Optimal Attack Paths in Nondeterministic Scenarios

As penetration testing frameworks have evolved and have become more comp...
research
06/19/2013

Penetration Testing == POMDP Solving?

Penetration Testing is a methodology for assessing network security, by ...
research
07/31/2013

POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing

Penetration Testing is a methodology for assessing network security, by ...
research
07/30/2013

Les POMDP font de meilleurs hackers: Tenir compte de l'incertitude dans les tests de penetration

Penetration Testing is a methodology for assessing network security, by ...
research
08/02/2020

SCNet: A Neural Network for Automated Side-Channel Attack

The side-channel attack is an attack method based on the information gai...
research
08/11/2022

A Survey of MulVAL Extensions and Their Attack Scenarios Coverage

Organizations employ various adversary models in order to assess the ris...

Please sign up or login with your details

Forgot password? Click here to reset