Visible to the public Modeling and Analysis of Stepping Stone AttacksConflict Detection Enabled

TitleModeling and Analysis of Stepping Stone Attacks
Publication TypeConference Paper
Year of Publication2014
AuthorsDavid Nicol, University of Illinois at Urbana-Champaign, Vikas Mallapura, University of Illinois at Urbana-Champaign
Conference Name2014 Winter Simulation Conference
PublisherIEEE
Conference LocationSavannah, GA
KeywordsUIUC
Abstract

Computer exploits often involve an attacker being able to compromise a sequence of hosts, creating a chain of "stepping stones" from his source to ultimate target. Stepping stones are usually necessary to access well-protected resources, and also serve to mask the attacker's location. This paper describes means of constructing models of networks and the access control mechanisms they employ to approach the problem of finding which stepping stone paths are easiest for an attacker to find. While the simplest formulation of the problem can be addressed with deterministic shortest-path algorithms, we argue that consideration of what and how an attacker may (or may not) launch from a compromised host pushes one towards solutions based on Monte Carlo sampling. We describe the sampling algorithm and some preliminary results obtained using it.

URLhttp://publish.illinois.edu/science-of-security-lablet/files/2014/06/Modeling-and-Anaylysis-of-Stepp...
Citation Keynode-23451

Other available formats:

Modeling and Anaylysis of Stepping Stone Attacks
AttachmentTaxonomyKindSize
Modeling and Anaylysis of Stepping Stone AttacksPDF document358.35 KBDownloadPreview
AttachmentSize
bytes