DocumentCode :
239523
Title :
Modeling and analysis of stepping stone attacks
Author :
Nicol, David M. ; Mallapura, Vikas
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Illinois at Urbana-Champaign, Urbana, IL, USA
fYear :
2014
fDate :
7-10 Dec. 2014
Firstpage :
3036
Lastpage :
3047
Abstract :
Computer exploits often involve an attacker being able to compromise a sequence of hosts, creating a chain of “stepping stones” from his source to ultimate target. Stepping stones are usually necessary to access well-protected resources, and also serve to mask the attacker´s location. This paper describes means of constructing models of networks and the access control mechanisms they employ to approach the problem of finding which stepping stone paths are easiest for an attacker to find. While the simplest formulation of the problem can be addressed with deterministic shortest-path algorithms, we argue that consideration of what and how an attacker may (or may not) launch from a compromised host pushes one towards solutions based on Monte Carlo sampling. We describe the sampling algorithm and some preliminary results obtained using it.
Keywords :
Monte Carlo methods; authorisation; deterministic algorithms; sampling methods; Monte Carlo sampling algorithm; access control mechanism; computer exploits; deterministic shortest-path algorithm; stepping stone attacks; Authentication; Computational modeling; Computers; Databases; Image edge detection; Measurement; Standards;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Simulation Conference (WSC), 2014 Winter
Conference_Location :
Savanah, GA
Print_ISBN :
978-1-4799-7484-9
Type :
conf
DOI :
10.1109/WSC.2014.7020142
Filename :
7020142
Link To Document :
بازگشت