Modelling and analysing network security policies in a given vulnerability setting

  • Authors:
  • Roland Rieke

  • Affiliations:
  • Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany

  • Venue:
  • CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

The systematic protection of critical information infrastructures requires an analytical process to identify the critical components and their interplay, to determine the threats and vulnerabilities, to assess the risks and to prioritise countermeasures where risk is unacceptable. This paper presents an integrated framework for model-based symbolic interpretation, simulation and analysis with a comprehensive approach focussing on the validation of network security policies. A graph of all possible attack paths is automatically computed from the model of an ICT network, of vulnerabilities, exploits and an attacker strategy. Constraints on this graph are given by a model of the network security policy. The impact of changes to security policies can be computed and visualised by finding differences in the attack graphs. A unique feature of the presented approach is, that abstract representations of these graphs can be computed that allow comparison of focussed views on the behaviour of the system. This guides optimal adaptation of the security policy to the given vulnerability setting.