Using attack trees to identify malicious attacks from authorized insiders

  • Authors:
  • Indrajit Ray;Nayot Poolsapassit

  • Affiliations:
  • Colorado State University, Fort Collins, CO;Colorado State University, Fort Collins, CO

  • Venue:
  • ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

A major concern for computer systems security is the threat from malicious insiders who execute perfectly legitimate operations to compromise system security. Unfortunately, most currently available intrusion detection systems (which include anomaly and misuse detection systems) fail to address this problem in a comprehensive manner. In this work we propose a framework that uses an attack tree to identify malicious activities from authorized insiders. We develop algorithms to generate minimal forms of attack tree customized for each user such that it can be used efficiently to monitor the user's activities. If the user's activities progress sufficiently up along the branches of the attack tree towards the goal of system compromise, we generate an alarm. Our system is not intended to replace existing intrusion detection and prevention technology, but rather is intended to complement current and future technology.