Modelling Network Security Using Key-Challenge Petri-nets
Download
Report
Transcript Modelling Network Security Using Key-Challenge Petri-nets
Towards Modelling Information
Security with Key-Challenge
Petri Nets
Teijo Venäläinen
[email protected]
Contents
1. Introduction
2. Various modelling methods
3. Graph based modelling
4. Key-Challenge Petri Nets
Introduction
Since 7/2006 in Information Technology
Research Institute (ITRI), Agora, JYU
Doctoral studies since 2009
Goal is to find a method for measuring
information security (IS)
Modelling and Simulation (M&S)
Motivation for testing/modelling
Testing a system in use is not a feasible
option => damage
Real system must be replicated (modelled)
somehow
Testing is done with the modelled system
How accurately does the model represent the
real system?
Resulting information
For the whole system or a single component,
the following results are interesting:
–
–
–
–
–
Mean time between failure (against attacks)
Success probability of attacks
Damage (performance degradation, money, …)
Attack route i.e. how the attack progresses
And more …
Testing methods
There are different methods, where varies [1]
– ”target audience”
– Human involement during testing
– Detail level
Role playing, ”Packet wars”, network design
tools
Mathematical modelling, state machines,
graph based modelling
Role playing
Scenario-based training exercises
High abstraction level
Test the strategic decision making process of
personnel and organizations
Computers not necessary, ”pencil & paper”
Target audience: high level decision makers
Does not provide technical IS information
”Packet wars”
Real network with real users, a dedicated test
network in a laboratory
Two teams: attackers and defenders
Highly accurate method but costly
Target audience: IS professionals
Network design tools
Accurate modelling of networks and normal
activities
Attack modelling is limited => limited results
No human involvement during testing, only
simulation
Target audience: IS professionals, network
designers
Mathematical modelling, state
machines, graph based models
Also approximations of the real system
Provide results faster through simulation
Cheap
Easily modifyable
Modelling & simulation
System
description
Model
Simulation
Graph based modelling
Network attack is usually a series of interdependent
actions leading to a goal (= breach in security)
Actions are illustrated using nodes and arcs => an
attack graph (AG)
Assign conditions (e.g. probability) on traversing
between nodes
Usually attacker’s point of view
Simulate by starting from a node and moving towards
the goal node(s)
Attack tree
Source [2]
Challenges
The system must be described at adequate
level of accuracy. Scalability with large
networks?
Valid input parameters (From where? How?)
Usability
Attacker’s and defender’s interaction (game
theory?)
Creating graphs is labor intensive =>
automatic tools
Petri Nets
Place (input/output): holds tokens
Arc: connects places and transitions
Transition: lets token pass through if
conditions are met
Token: moves from place to place
Key-Challenge Petri Nets (KCPN)
A modelling method under development
Based on Petri-nets
KCPN graph is created using network and
vulnerability information
Conditions for transitions = key-challenge
– challenge = security measure
– key = means to circumvent/break the security
measure
KCPN: overview
Hierarchical i.e. modelling may be performed
using various abstration levels
Modular structure
Place = network device or attack action
Arc = physical connection of devices or
causal relation of attack actions
Transition = challenge (security measure)
KCPN: simulation
Attacker collects keys that allow him to
progress in the graph
Variables may be assigned for transitions
– Probability of being detected
– Duration of an attack action (time distribution)
– Cost, skill level, etc.
It is possible to perform an attack action
without required keys but with a greater
cost/duration
KCPN: results
Simulation results include:
– Probability of success of an entire attack
– The most vulnerable attack path
– The duration of the entire attack
Results may be used as input data within the
model (simulate modules independently)
KCPN: example
Two hierarchy levels:
– Topology level (physical world)
– Attack action level (abstract world)
Multiple network devices lumped into a single
node (Hosts)
Devices with similar connections, OS,
software, etc. => lumped together
KCPN: the physical network
KCPN:
the
graph
Sources
[1] J. Saunders. Simulation Approaches in
Information Security Education. Proceedings
of 6th National Colloquium for Information
System Security Education, 2002.
[2] Bruce Schneier. Attack Trees. SANS
Network Security 1999.
http://www.cs.utk.edu/~dunigan/cns06/attackt
rees.pdf
Thank You!