skip to main content
10.1145/2808475.2808478acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article
Public Access

A Theory of Cyber Attacks: A Step Towards Analyzing MTD Systems

Published:12 October 2015Publication History

ABSTRACT

Moving Target Defenses (MTD) have been touted as a game changing approach to computer security that eliminates the static nature of current computer systems -- an attacker's biggest advantage. While promising, the dynamism of MTD introduces challenges related to understanding and quantifying the impact of MTD systems on security, users, and attackers. To analyze this impact, both the concepts of MTD systems and cyber attacks must be formalized. While a theory of MTD systems was proposed in [18], this paper presents a theory of cyber attacks that supports the understanding and analysis of the interaction between MTD systems and the attacks they hope to thwart. The theory defines key concepts that support precise discussion of attacker knowledge, attack types, and attack instances. The paper also presents concrete examples to show how these definitions and concepts can be used in realistic scenarios.

References

  1. S. M. Bellovin. On the brittleness of software and the infeasibility of security metrics. Security & Privacy, IEEE, 4(4):96--96, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. A. Çamtepe and B. Yener. A formal method for attack modeling and detection. SA Camtepe, B. Yener, 2006.Google ScholarGoogle Scholar
  3. T. Hobson, H. Okhravi, D. Bigelow, R. Rudd, and W. Streilein. On the challenges of effective movement. In Proceedings of the First ACM Workshop on Moving Target Defense, pages 41--50. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Homer, S. Zhang, X. Ou, D. Schmidt, Y. Du, S. R. Rajagopalan, and A. Singhal. Aggregating vulnerability metrics in enterprise networks using attack graphs. Journal of Computer Security, 21(4):561--597, 2013. Google ScholarGoogle ScholarCross RefCross Ref
  5. K. Ingols, R. Lippmann, and K. Piwowarski. Practical attack graph generation for network defense. In Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Jajodia and S. Noel. Advanced cyber attack modeling, analysis, and visualization. Technical report, George Mason University, Mar. 2010.Google ScholarGoogle Scholar
  7. B. Kordy, L. Pietre-Cambacedes, and P. Schweitzer. Dag-based attack and defense modeling: Don't miss the forest for the attack trees. CoRR, abs/1303.7397, 2013.Google ScholarGoogle Scholar
  8. D. J. Leversage and E. James. Estimating a system's mean time-to-compromise. Security & Privacy, IEEE, 6(1):52--60, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. P. Moore, R. J. Ellison, and R. C. Linger. Attack modeling for information security and survivability. Technical report, Carnegie Mellon University/SEI Report Number: Carnegie Mellon University/SEI-2001-TN-001, Mar. 2001.Google ScholarGoogle ScholarCross RefCross Ref
  10. NITRD. National Cyber Leap Year Summit 2009 co-chairs' report, networking and information technology research and development. Technical report, National Office for the Federal Networking and Information Technology Research and Development Program, Sept. 2009.Google ScholarGoogle Scholar
  11. X. Ou, S. Govindavajhala, and A. W. Appel. Mulval: A logic-based network security analyzer. In Proceedings of the 14th Conference on USENIX Security Symposium, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. B. Schneier. Attack trees. https://www.schneier.com/paper-attacktrees-ddj-ft.html, 1999.Google ScholarGoogle Scholar
  13. H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In Proceedings of the 11th ACM conference on Computer and communications security, pages 298--307. ACM, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. P. Singh. Towards a science of security. http://www.computer.org/portal/web/computingnow/archive/january2013, 2013. Online, accessed June 30, 2014.Google ScholarGoogle Scholar
  15. J. Steffan and M. Schumacher. Collaborative attack modeling. In Proceedings of ACM Symposium on Applied Computing (SAC), 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. P. Team. PaX address space layout randomization (ASLR), 2003.Google ScholarGoogle Scholar
  17. R. Zhuang, S. A. DeLoach, and X. Ou. A Model for Analyzing the Effect of Moving Target Defenses on Enterprise Networks. In Proceedings of the 9th Annual Cyber and Information Security Research Conference, pages 73--76. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. R. Zhuang, S. A. DeLoach, and X. Ou. Towards a theory of moving target defense. In Proceedings of the First ACM Workshop on Moving Target Defense, pages 31--40. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Theory of Cyber Attacks: A Step Towards Analyzing MTD Systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MTD '15: Proceedings of the Second ACM Workshop on Moving Target Defense
      October 2015
      114 pages
      ISBN:9781450338233
      DOI:10.1145/2808475

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 October 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      MTD '15 Paper Acceptance Rate8of19submissions,42%Overall Acceptance Rate40of92submissions,43%

      Upcoming Conference

      ICSE 2025

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader