Quantitative Assessment of Operational Security: Models and Tools *

作者: Marc Dacier , Yves Deswarte Mohamed Kaâniche

DOI:

关键词: Security testingCloud computing securityComputer securityCovert channelSecurity through obscuritySecurity serviceSecurity convergenceSecurity information and event managementDistributed computingComputer security modelEngineering

摘要: Abstract This paper proposes a novel approach to help computing system administrators inmonitoring the security of their systems. is based on modeling thesystem as privilege graph exhibiting operational vulnerabilities and ontransforming this into Markov chain corresponding all possiblesuccessful attack scenarios. A set tools has been developed generateautomatically Unix system, transform it thecorresponding compute characteristic measures theoperational security.Keywords: quantitative evaluation, graph, 1. Introduction Computing relies mostly users, operators administrators, eventhe best designed if badly operated, would be unsecure. Most authentication andprotection mechanisms can diverted by malicious or careless then allowing possibleintruders perform breaches. not surprising since most users are lessinterested in than efficiency, flexibility cooperation with other users.A scrupulous administrator should try maintain for his systemwith least incidence user operation. It thus tremendously important assess thesecurity level monitor evolution withrespect configuration modifications, application operation changes andenvironment evolution.This develops an evaluate systems.Examples taken from Unix™ systems, but could extended otheroperating systems distributed well. Section 2 shows how model acomputing way that exploited possible

参考文章(17)
Stephen G Kochan, Patrick H Wood, Unix System Security ,(1986)
Eugene H. Spafford, Daniel Farmer, The COPS Security Checker System USENIX Summer. pp. 165- 170 ,(1990)
M. Dacier, Y. Deswarte, M. Kaâniche, Models and tools for quantitative assessment of operational security information security. pp. 177- 186 ,(1996) , 10.1007/978-1-5041-2919-0_15
Gene Spafford, Simson Garfinkel, Practical UNIX Security ,(1991)
Tomas Olovsson, Erland Jonsson, Sarah Brocklehurst, Bev Littlewood, Towards operational measures of computer security: Experimentation and modelling Predictably Secure Computing Systems. pp. 555- 569 ,(1995) , 10.1007/978-3-642-79789-7_31
Eugene H. Spafford, The internet worm program: an analysis ACM SIGCOMM Computer Communication Review. ,vol. 19, pp. 17- 57 ,(1989) , 10.1145/66093.66095
Bruce L. Riddle, Murray S. Miron, Judith A. Semo, Passwords in use in a university timesharing environment Computers & Security. ,vol. 8, pp. 569- 579 ,(1989) , 10.1016/0167-4048(89)90049-7
Brian Reid, Lessons from the UNIX breakins at Stanford ACM SIGSOFT Software Engineering Notes. ,vol. 11, pp. 29- 35 ,(1986) , 10.1145/382298.382364