DocumentCode
231297
Title
Using Network Tainting to Bound the Scope of Network Ingress Attacks
Author
Mell, Peter ; Harang, Richard E.
Author_Institution
Nat. Inst. of Stand. & Technol., Gaithersburg, MD, USA
fYear
2014
fDate
June 30 2014-July 2 2014
Firstpage
206
Lastpage
215
Abstract
This research describes a novel security metric, network taint, which is related to software taint analysis. We use it here to bound the possible malicious influence of a known compromised node through monitoring and evaluating network flows. The result is a dynamically changing defense-in-depth map that shows threat level indicators gleaned from monotonically decreasing threat chains. We augment this analysis with concepts from the complex networks research area in forming dynamically changing security perimeters and measuring the cardinality of the set of threatened nodes within them. In providing this, we hope to advance network incident response activities by providing a rapid automated initial triage service that can guide and prioritize investigative activities.
Keywords
network theory (graphs); security of data; defense-in-depth map; network flow evaluation; network flow monitoring; network incident response activities; network ingress attacks; network tainting metric; security metric; security perimeters; software taint analysis; threat level indicators; Algorithm design and analysis; Complex networks; Digital signal processing; Measurement; Monitoring; Security; Software; complex networks; network tainting; scale-free; security;
fLanguage
English
Publisher
ieee
Conference_Titel
Software Security and Reliability (SERE), 2014 Eighth International Conference on
Conference_Location
San Francisco, CA
Print_ISBN
978-1-4799-4296-1
Type
conf
DOI
10.1109/SERE.2014.34
Filename
6895431
Link To Document