DocumentCode :
231297
Title :
Using Network Tainting to Bound the Scope of Network Ingress Attacks
Author :
Mell, Peter ; Harang, Richard E.
Author_Institution :
Nat. Inst. of Stand. & Technol., Gaithersburg, MD, USA
fYear :
2014
fDate :
June 30 2014-July 2 2014
Firstpage :
206
Lastpage :
215
Abstract :
This research describes a novel security metric, network taint, which is related to software taint analysis. We use it here to bound the possible malicious influence of a known compromised node through monitoring and evaluating network flows. The result is a dynamically changing defense-in-depth map that shows threat level indicators gleaned from monotonically decreasing threat chains. We augment this analysis with concepts from the complex networks research area in forming dynamically changing security perimeters and measuring the cardinality of the set of threatened nodes within them. In providing this, we hope to advance network incident response activities by providing a rapid automated initial triage service that can guide and prioritize investigative activities.
Keywords :
network theory (graphs); security of data; defense-in-depth map; network flow evaluation; network flow monitoring; network incident response activities; network ingress attacks; network tainting metric; security metric; security perimeters; software taint analysis; threat level indicators; Algorithm design and analysis; Complex networks; Digital signal processing; Measurement; Monitoring; Security; Software; complex networks; network tainting; scale-free; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Security and Reliability (SERE), 2014 Eighth International Conference on
Conference_Location :
San Francisco, CA
Print_ISBN :
978-1-4799-4296-1
Type :
conf
DOI :
10.1109/SERE.2014.34
Filename :
6895431
Link To Document :
بازگشت