论文标题
使用杀伤链和攻击图识别攻击路径
Identification of Attack Paths Using Kill Chain and Attack Graphs
论文作者
论文摘要
网络攻击者的不断发展的能力迫使安全管理人员专注于对新兴威胁的早期识别。有针对性的网络攻击通常由几个阶段组成,从对网络环境的初始侦察到对目标的最终影响。本文使用杀伤链和攻击图研究了多步网络威胁情景的识别。杀戮链和攻击图是威胁建模概念,可确定弱安全防御点。我们提出了一个新颖的杀戮链攻击图,将杀死链和攻击图合并在一起。这种方法决定了攻击者行动的可能链及其在受保护网络中的物质化。该图生成根据违反安全属性使用威胁的分类。该图允许确定管理员应重点关注和适用的对策以减轻可能的网络威胁。我们为预定义的网络威胁,尤其是脆弱性开发和网络威胁实施了建议的方法。该方法已在现实世界中的用例上进行了验证。公开可用的实现包含概念验证链链攻击图生成器。
The ever-evolving capabilities of cyber attackers force security administrators to focus on the early identification of emerging threats. Targeted cyber attacks usually consist of several phases, from initial reconnaissance of the network environment to final impact on objectives. This paper investigates the identification of multi-step cyber threat scenarios using kill chain and attack graphs. Kill chain and attack graphs are threat modeling concepts that enable determining weak security defense points. We propose a novel kill chain attack graph that merges kill chain and attack graphs together. This approach determines possible chains of attacker's actions and their materialization within the protected network. The graph generation uses a categorization of threats according to violated security properties. The graph allows determining the kill chain phase the administrator should focus on and applicable countermeasures to mitigate possible cyber threats. We implemented the proposed approach for a predefined range of cyber threats, especially vulnerability exploitation and network threats. The approach was validated on a real-world use case. Publicly available implementation contains a proof-of-concept kill chain attack graph generator.