Les POMDP font de meilleurs hackers: Tenir compte de l'incertitude dans les tests de penetration

07/30/2013
by   Carlos Sarraute, et al.
0

Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks. Doing so automatically allows for regular and systematic testing. A key question is how to generate the attacks. This is naturally formulated as planning under uncertainty, i.e., under incomplete knowledge about the network configuration. Previous work uses classical planning, and requires costly pre-processes reducing this uncertainty by extensive application of scanning methods. By contrast, we herein model the attack planning problem in terms of partially observable Markov decision processes (POMDP). This allows to reason about the knowledge available, and to intelligently employ scanning actions as part of the attack. As one would expect, this accurate solution does not scale. We devise a method that relies on POMDPs to find good attacks on individual machines, which are then composed into an attack on the network as a whole. This decomposition exploits network structure to the extent possible, making targeted approximations (only) where needed. Evaluating this method on a suitably adapted industrial test suite, we demonstrate its effectiveness in both runtime and solution quality.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/31/2013

POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing

Penetration Testing is a methodology for assessing network security, by ...
research
06/19/2013

Penetration Testing == POMDP Solving?

Penetration Testing is a methodology for assessing network security, by ...
research
07/30/2013

Automated Attack Planning

Penetration Testing is a methodology for assessing network security, by ...
research
06/18/2013

Attack Planning in the Real World

Assessing network security is a complex and difficult task. Attack graph...
research
06/17/2013

An Algorithm to Find Optimal Attack Paths in Nondeterministic Scenarios

As penetration testing frameworks have evolved and have become more comp...
research
06/09/2010

Building Computer Network Attacks

In this work we start walking the path to a new perspective for viewing ...

Please sign up or login with your details

Forgot password? Click here to reset