Risk
7/28/2008
02:35 PM
George V. Hulme
George V. Hulme
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Modeling IT Attacks

Every day IT managers have to contend with an ever-changing risk environment. That's where good risk modeling can help.

Every day IT managers have to contend with an ever-changing risk environment. That's where good risk modeling can help.Late Friday afternoon, EE Times ran a story about ongoing research at NIST and George Mason University that aims to create "attack graphs" designed to help measure the risk posture of an organization:

By analyzing and assigning probabilities to every path a hacker could use to penetrate a computer system, NIST hopes attack graphs will help IT managers identify weak points that need to be patched to safeguard valuable data.

Attack graphs, developed by NIST jointly with George Mason University, calculate the vulnerability of each path into a computer system using NIST's National Vulnerability Database (NVD). By assigning a probable risk to various computer network pathways, the researchers hope to secure computer systems from multistep attacks.

Here's how NIST described the technology in its announcement:

NIST researchers evaluate each route and assign it a risk based on how challenging it is to the hacker. The paths are determined using a technique called "attack graphs." A new analysis technique based on attack graphs was jointly developed by Singhal and research colleagues at George Mason University. A patent is pending on the technique.

This type of threat modeling can go a long way in helping security teams determine which patches they need to deploy first. For instance, by evaluating the vulnerabilities in a network through a scan, you could see that there are many low, medium, and high vulnerabilities scattered about. Fortunately, the low-risk vulnerabilities are on the perimeter, and the highly critical flaws are deep inside the corporate network on a number of servers.

The bad news is that the business managers and application owners don't want those servers patched for another three weeks, because it's so costly and risky to mess with them. What do you do now to mitigate those critical vulnerabilities?

Well, a close look at your attack graph (as NIST is calling it) reveals that by patching a few low-risk vulnerabilities on the perimeter, all risky external access to those at-risk servers has been closed. You can sleep now knowing that those servers are relatively safe until the business will let you apply patches.

Threat modeling like this certainly isn't new, and security vendors such as Skybox Security and RedSeal Systems have been providing modeling capabilities for some time.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4262
Published: 2014-07-28
svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-...

CVE-2013-4840
Published: 2014-07-28
Unspecified vulnerability in HP and H3C VPN Firewall Module products SECPATH1000FE before 5.20.R3177 and SECBLADEFW before 5.20.R3177 allows remote attackers to cause a denial of service via unknown vectors.

CVE-2013-7393
Published: 2014-07-28
The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2013-4262 based on different affected versions...

CVE-2014-2974
Published: 2014-07-28
Cross-site request forgery (CSRF) vulnerability in php/user_account.php in Silver Peak VX through 6.2.4 allows remote attackers to hijack the authentication of administrators for requests that create administrative accounts.

CVE-2014-2975
Published: 2014-07-28
Cross-site scripting (XSS) vulnerability in php/user_account.php in Silver Peak VX before 6.2.4 allows remote attackers to inject arbitrary web script or HTML via the user_id parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.