Home   >   CSC-OpenAccess Library   >    Manuscript Information
Application of Attack Graphs in Intrusion Detection Systems: An Implementation
Ahmad Fadlallah, Hassan Sbeity, Mohammad Malli, Patrick Lteif
Pages - 1 - 12     |    Revised - 31-03-2016     |    Published - 30-04-2016
Volume - 8   Issue - 1    |    Publication Date - April 2016  Table of Contents
MORE INFORMATION
KEYWORDS
Attack Graphs, IDS, Vulnerability Analysis, Network Security.
ABSTRACT
Internet attacks are continuously increasing in the last years, in terms of scale and complexity, challenging the existing defense solutions with new complications and making them almost ineffective against multi-stage attacks, in particular the intrusion detection systems which fail to identify such complex attacks. Attack graph is a modeling technique used to visualize the different steps an attacker might select to achieve his end game, based on existing vulnerabilities and weaknesses in the system. This paper studies the application of attack graphs in intrusion detection and prevention systems (IDS/IPS) in order to better identify complex attacks based on predefined models, configurations, and alerts. As a “proof of concept”, a tool is developed which interfaces with the well-known SNORT [1] intrusion detection system and matches the alerts with an attack graph generated using the NESSUS [2] vulnerability scanner (maintained up-to-date using the National Vulnerability Database (NVD) [3]) and the MULVAL [4] attack graph generation library. The tool allows to keep track with the attacker activities along the different stages of the attack graph.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
A. Baker. “Barnyard: Output spool reader for snort”, Internet: http://barnyard.sourceforge.net. 2016. [February 16, 2016].
A.Singhal and X.Ou. “Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs”. National Institute of Science and Technology Interagency Report 7788. August 2011.
ArborNetworks. “Worldwide infrastructure security report - volume XI”. Internet: https://www.arbornetworks.com/images/documents/WISR2016_EN_Web.pdf. January 26, 2016. [February 16, 2016].
C. Phillips, L.P. Swiler. “A graph-based system for network-vulnerability analysis”. In Proceedings of the ACM Workshop on New Security Paradigms (NSPW ’98). 1998. pp71–79.
Cisco Inc. “Cisco 2016 annual security report”. Internet: www.cisco.com/go/asr2016. January 2016. [February 16, 2016].
J. Ellson, E. Gansner, L. Koutsofios, S.C. North, G. Woodhull. “GraphViz-Open source graph drawing tools”. Graph Drawing, Lecture Notes in Computer Science, vol. 2265, Springer Berlin Heidelberg, 2002; pp 483–484.
J. Lee, H. Lee, In HP. “Scalable attack graph for risk assessment”. In Proceedings of the 23rd International Conference on Information Networking (ICOIN’09). 2009. pp 78–82.
K. Ingols, R. Lippmann, K. Piwowarski. “Practical attack graph generation for network defense”. 22nd Annual Computer Security Applications Conference (ACSAC ’06), 2006. pp 121-130.
L. Huiying. “Research on network risk assessment based on attack probability”. Second International Workshop on Computer Science and Engineering (WCSE ‘09). 2009. vol. 2, pp. 376–381.
L. Surhone, M. Timpledon, S. Marseken. “Sguil”. VDM Publishing, 2010.
MITRE Corporation. “Common vulnerabilities and exposures (CVE): The standard for information security vulnerability names”. Internet: http://cve.mitre.org. 2016. [February 16, 2016].
MITRE Corporation. “Open vulnerability and assessment language (OVAL)” Internet: http://oval.mitre.org/. 2016. [February 16, 2016].
National Institute of Standards and Technologies (NIST). “National Vulnerability Database”, Internet: http://nvd.nist.gov. 2016. [February 16, 2016].
O. Sheyner and J.M. Wing. “Tools for generating and analyzing attack graphs”. In Proceedings of Workshop on Formal Methods for Components and Objects, 2004,344-371.
O. Sheyner, J. Haines, S. Jha, R. Lippmann, J. Wing. “Automated generation and analysis of attack graphs”. In proceedings of the IEEE Symposium on Security and Privacy, 2002. pp 273–284.
R. Lippmann, K. Ingols. “An annotated review of past papers on attack graphs”. MIT Lincoln laboratory Project Report, 31 March 2005.
S. Jha, O. Sheyner and J. Wing. “Two formal analyses of attack graphs”. In Proceedings of the 15th IEEE Computer Security Foundations Workshop, 2002, pp 49–63.
S. Noel, M. Jacobs, P. Kalapa, S. Jajodia. “Multiple coordinated views for network attack graphs”. In Proceedings of the IEEE Workshops on Visualization for Computer Security,2005. pp12-14.
S. Radack, R. Kuhn. “Managing security: The security content automation protocol”. in IT Professional, vol.13, no.1, pp.9-11, Jan.-Feb. 2011.
S.S. Huang, T.J. Green, B.T. Loo. “Datalog and emerging applications: An interactive tutorial”. In Proceedings of the ACM International Conference on Management of Data (SIGMOD’11). 2011. pp1213–1216.
Snort-Project. “Snort network intrusion detection system”, Internet: http://www.snort.org.2016. [February 16, 2016].
Tenable Network Security Inc. “Nessus vulnerability scanner”. Internet: http://www.tenable.com/products/nessus. 2016. [February 16, 2016].
X. Ou, S. Govindavajhala, A.W. Appel. “MULVAL: A logic-based network security analyzer”. In Proceedings of the 14th USENIX Security Symposium (SSYM’05). 2005.
X. Ou, W.F. Boyer, M.A. McQueen. “A scalable approach to attack graph generation”. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS). pp 336–345.
Dr. Ahmad Fadlallah
Faculty of Computer Studies Arab Open University Beirut - Lebanon
afadlallah@aou.edu.lb
Mr. Hassan Sbeity
Faculty of Computer Studies Arab Open University Beirut - Lebanon
Mr. Mohammad Malli
Faculty of Computer Studies Arab Open University Beirut - Lebanon
Dr. Patrick Lteif
Sodetel, Beirut - Lebanon


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS