On the Completeness of Attack Mutation Algorithms

  • Authors:
  • Shai Rubin;Somesh Jha;Barton P. Miller

  • Affiliations:
  • University of Wisconsin, Madison, USA;University of Wisconsin, Madison, USA;University of Wisconsin, Madison, USA

  • Venue:
  • CSFW '06 Proceedings of the 19th IEEE workshop on Computer Security Foundations
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

An attack mutation algorithm takes a known instance of an attack and transforms it into many distinct instances by repeatedly applying attack transformations. Such algorithms are widely used for testing intrusion detection systems. We investigate the notion of completeness of a mutation algorithm: its capability to generate all possible attack instances from a given set of attack transformations. We define the notion of a \Phi-complete mutation algorithm. Given a set of transformations \phi, an algorithm is complete with respect to \Phi, if it can generate every instance that the transformations in \Phi derive. We show that if the rules in \Phi are uniform and reversible then a \Phi-complete algorithm exists. Intuitively speaking, uniform and reversible transformations mean that we can first exclusively apply transformations that simplify the attack, then exclusively apply transformations that complicate it, and still get all possible instances that are derived by the rules in \Phi. Although uniformity and reversibility may appear severe restrictions, we show that common attack transformations are indeed uniform and reversible. Therefore, our \Phi- complete algorithm can be incorporated into existing testing tools for intrusion detection systems. Furthermore, we show that a \Phi-complete algorithm is useful, not only for testing purposes, but also for determining whether two packet traces are two different mutations of the same attack. % MathType!MTEF!2!1!+- % feaafiart1ev1aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn % hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr % 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq-Jc9 % vqaqpepm0xbba9pwe9Q8fs0-yqaqpepae9pg0FirpepeKkFr0xfr-x % fr-xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaeuOPdyeaaa!3767! \[ \Phi\]