Representing TCP/IP Connectivity For Topological Analysis of Network Security

  • Authors:
  • Ronald Ritchey;Brian O'Berry;Steven Noel

  • Affiliations:
  • -;-;-

  • Venue:
  • ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

The individual vulnerabilities of hosts on a network canbe combined by an attacker to gain access that would notbe possible if the hosts were not interconnected. Currentlyavailable tools report vulnerabilities in isolation and inthe context of individual hosts in a network. Topologicalvulnerability analysis (TVA) extends this by searching forsequences of interdependent vulnerabilities, distributedamong the various network hosts. Model checking hasbeen applied to the analysis of this problem with someinteresting initial result. However previous efforts did nottake into account a realistic representation of networkconnectivity. These models were enough to demonstratethe usefulness of the model checking approach but wouldnot be sufficient to analyze real-world network securityproblems. This paper presents a modem of network connectivityat multiple levels of the TCP/IP stack appropri-atefor use in a model checker. With this enhancement, it ispossible to represent realistic networks including commonnetwork security devices such as firewalls, filteringrouters, and switches.