Simulated Penetration Testing and Mitigation Analysis

05/15/2017
by   Michael Backes, et al.
0

Penetration testing is a well-established practical concept for the identification of potentially exploitable security weaknesses and an important component of a security audit. Providing a holistic security assessment for networks consisting of several hundreds hosts is hardly feasible though without some sort of mechanization. Mitigation, prioritizing counter- measures subject to a given budget, currently lacks a solid theoretical understanding and is hence more art than science. In this work, we propose the first approach for conduct- ing comprehensive what-if analyses in order to reason about mitigation in a conceptually well-founded manner. To evaluate and compare mitigation strategies, we use simulated penetration testing, i.e., automated attack-finding, based on a network model to which a subset of a given set of mitigation actions, e.g., changes to the network topology, system updates, configuration changes etc. is applied. We determine optimal combinations that minimize the maximal attacker success (similar to a Stackelberg game), and thus provide a well-founded basis for a holistic mitigation strategy. We show that these what-if analysis models can largely be derived from network scan, public vulnerability databases and manual inspection with various degrees of automation and detail, and we simulate mitigation analysis on networks of different size and vulnerability.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/02/2023

Systemic Risk and Vulnerability Analysis of Multi-cloud Environments

With the increasing use of multi-cloud environments, security profession...
research
09/06/2023

Automated CVE Analysis for Threat Prioritization and Impact Prediction

The Common Vulnerabilities and Exposures (CVE) are pivotal information f...
research
06/06/2020

An Attacker Modeling Framework for the Assessment of Cyber-Physical Systems Security

Characterizing attacker behavior with respect to Cyber-Physical Systems ...
research
06/22/2023

A Model Based Framework for Testing Safety and Security in Operational Technology Environments

Todays industrial control systems consist of tightly coupled components ...
research
10/26/2022

Using Deception in Markov Game to Understand Adversarial Behaviors through a Capture-The-Flag Environment

Identifying the actual adversarial threat against a system vulnerability...
research
03/11/2021

The Curse of Correlations for Robust Fingerprinting of Relational Databases

Database fingerprinting schemes have been widely adopted to prevent unau...
research
06/21/2019

Quantitative Mitigation of Timing Side Channels

Timing side channels pose a significant threat to the security and priva...

Please sign up or login with your details

Forgot password? Click here to reset