Outline Network security (Part II): Can we do a better job? " • State of the practices" • Drawbacks and Issues" • A proposed alternative" Rattikorn Hewett" NSF SFS Workshop August 14-18, 2014 Center for Science & Engineering of Cyber Security Computer Network Whitacre College of Engineering 2 Computer Network How can I secure this network? Network Administrator Center for Science & Engineering of Cyber Security Whitacre College of Engineering 3 Center for Science & Engineering of Cyber Security Whitacre College of Engineering 4 1 State of the practices State of the practices 1) Admission Control 2) Data Control Authentication Encryption Authentication Authentication Verifying the identification of authorized users Center for Science & Engineering of Cyber Security Whitacre College of Engineering 5 State of the practices Encryption/Decryption of data to be transmitted Center for Science & Engineering of Cyber Security Whitacre College of Engineering 6 State of the practices 4) Security Policy 3) Infection Control ftp Anti-Virus http Anti-Virus Anti-Virus SMTP Virus protection, virus removal, and infection containment Center for Science & Engineering of Cyber Security Whitacre College of Engineering 7 Firewall policy to protect unauthorized requests from outside the network Center for Science & Engineering of Cyber Security Whitacre College of Engineering 8 2 State of the practices State of the practices Where is the weakness of this network to hack into? Common IT Security Setup Authentication Authentication Anti-Virus Where is the weakness of this network to hack into? Anti-Virus Encryption Encryption Attacker Authentication Authentication What about IDS to detect intrusion? Network Administrator Center for Science & Engineering of Cyber Security Anti-Virus Anti-Virus Secure enough? Attacker Authentication Authentication Anti-Virus Anti-Virus Network Administrator Whitacre College of Engineering 9 State of the practices Center for Science & Engineering of Cyber Security Whitacre College of Engineering 10 Outline 4) IDS (Intrusion Detection System) I will outsmart IDS with new tricks • State of the practices" • Drawbacks and Issues" Authentication Anti-Virus • A proposed alternative" Encryption Authentication Anti-Virus Authentication Anti-Virus Attacker IDS monitors network activities and alerts when attack patterns are detected Center for Science & Engineering of Cyber Security Whitacre College of Engineering 11 Center for Science & Engineering of Cyber Security Whitacre College of Engineering 12 3 Recaps current practices & drawbacks Other Issues ….. • Admission control, e.g., authentication" • Data control, e.g., encryption" • Infection control, e.g., anti-virus, virus removal/containment" • Security policy, e.g., firewalls, RBAC(role-based access control)" " à Most defend attack at entering points or prevent non-targeted spreading à What about targeted attacks in the network? • Computer networks are unavoidably vulnerable as long as they have to provide services" " Network Vulnerabilities! Exploitable errors in ! Network Configurations" "• Intrusion detection system (IDS) à Can’t prevent attacks à Can’t detect unfamiliar attacks à Requires resource for continuous monitoring Center for Science & Engineering of Cyber Security Whitacre College of Engineering • Ports & services enabled 13 • Apache Chunked-Code on Apache web servers • Buffer overflow on Windows XP SP2 operating environments • TNS- Listener on Oracle software for database servers Center for Science & Engineering of Cyber Security Network Security Issues Whitacre College of Engineering 14 Network Security Issues • Computer networks are vulnerable" • Computer networks are vulnerable" • Commercial scanners can only detect network vulnerabilities at individual points " Apache Chunked-Code Buffer-Over flow! Apache httpd version 1.3 through 1.3.24 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a chunkencoded HTTP request that causes Apache to use an incorrect size." Oracle TNS Listener! …! Wu-ftpd SockPrintf! CVE 2002-0392" …! Common Vulnerability & Exposure Wu-ftpd restricted-gid! …! " Center for Science & Engineering of Cyber Security Implementation of " Software Services" Whitacre College of Engineering " 15 Center for Science & Engineering of Cyber Security Whitacre College of Engineering 16 4 Network Security: Issues Outline • Computer networks are vulnerable" • Commercial scanners can only detect network vulnerabilities at individual points " • Current state of the practices" • Issues and drawbacks" • A proposed alternative" " • Perfectly secure isolated services do not guarantee secure network of combined services" " Center for Science & Engineering of Cyber Security Whitacre College of Engineering 17 Center for Science & Engineering of Cyber Security A preventative approach 18 Security Model Generation Idea: ! ! • Pre-determine all possible attacks from network vulnerabilities " • Use results to determine appropriate actions" Goal: ! To generate all possible attacks from network vulnerabilities Exploit CVE-1 CVE-1 CVE-3 Network" • Vulnerabilities" Security Model • Configurations" Generation! • Security Policy " Whitacre College of Engineering • Prioritize critical path" Exploit CVE-4 Model • Select appropriate Analysis! counter measures" CVE-4 Scanner Attack Model: all possible chains of exploits" (or exploitable vulnerabilities)" Exploit CVE-3 CVE-1 CVE-2 …. Exploit CVE-2 Exploit CVE-1 …. All possible attacks • Identify vulnerabilities of each computer in the network using a" vulnerability scanner (e.g., Nessus, SAINT, OpenVAS) • Apply all exploitable vulnerabilities for each attack state Center for Science & Engineering of Cyber Security Whitacre College of Engineering 19 Center for Science & Engineering of Cyber Security Whitacre College of Engineering 20 5 Example of Simple Network Example of Simple Network Host A, access = 2 Scan the vulnerabilities ap t1 ap t1 tns t2 Center for Science & Engineering of Cyber Security Exploit ap? Preconditions: Whitacre College of Engineering 21 Center for Science & Engineering of Cyber Security Example of Simple Network Whitacre College of Engineering 22 Example of Simple Network Host A, access = 2 Host A, access = 2 exploit ap ap t1 Center for Science & Engineering of Cyber Security tns t2 • Access on A≥1 • A & W are connected Goal: root access tns t2 Host W access = 2 Whitacre College of Engineering 23 Exploit tns? Preconditions: ap t1 Center for Science & Engineering of Cyber Security tns t2 • Access on A≥1 • A & D are connected Whitacre College of Engineering 24 6 Example of a simple network Complete Attack Model Can you finish the rest? Host A, access = 2 Exploit tns? ap t1 tns t2 Not exploitable t1 Host W, access = 1 Goal: root access of a database server Attack Model shows all possible attack paths Center for Science & Engineering of Cyber Security Whitacre College of Engineering 25 Center for Science & Engineering of Cyber Security A preventative approach Why model analysis? - Example Idea: ! ! • Pre-determine all possible attacks from network vulnerabilities " • Use results to determine appropriate actions" Network" • Vulnerabilities" Security Model • Configurations" Generation! • Security Policy " • Prioritize critical path" Model • Select appropriate Analysis! counter measures" How can we prevent attack to gain root access at IP2?" v3 = CVE-2004-0148" “wu-ftpd 2.6.2 and earlier, with the restricted-gid option enabled, allows local users to bypass access restrictions by changing the permissions to prevent access to their home directory, which causes wu-ftpd to use the root directory instead.”" " Counter-measure " 1. Upgrade wu-ftpd to version > 2.6.2, OR! 2. Replace wu-ftpd with other ftpd-service, OR! 3. Stop providing ftpd-service at IP2 Attack Model: all possible chains of exploits" (or exploitable vulnerabilities)" Center for Science & Engineering of Cyber Security Whitacre College of Engineering 26 Whitacre College of Engineering 27 Center for Science & Engineering of Cyber Security Root access to IP2 Whitacre College of Engineering 28 7 Why model analysis? - Example Issues • The resulting attack models are huge even for a Root access at the small network " attacker’s machine How can we prevent attack to gain root access at IP2?" Block v3 into IP2 More …." Block v1 into IP2 • How do we identify these blocks?" • How do we pick an appropriate block/counter measure?" • Which state to focus first, e.g., (IP1, 2) vs. (IP2, 1)" Which is more likely to be attacked?" Center for Science & Engineering of Cyber Security Goal: Root access to IP2 Root access to IP2 Whitacre College of Engineering 29 Attack Model Analysis Center for Science & Engineering of Cyber Security Whitacre College of Engineering 30 Exploit-based Analysis To extract useful information from security model to protect the network Prioritizes attack points in an attack model based on the ease in exploiting their vulnerabilities" " "Easy to exploit à High exploitability " à High priority (for fixing) " Visualization! • Group similar nodes for display [Noel & Jajodia, 05]" Graph-based ! • Minimisation analysis to block s" attackwpaths ork [Jha et al, 02] " net t u • Manual, time-consuming" abo • Automatic " e • Non-systematic" • Limited to specific models" edg owl s kn e s Markov model-based! Our approach! u one • EstimateNlikelihood of attack" • Exploit-based analysis" [Sheyner et al., 02; " • Use knowledge about exploitability" Mehta et al.,06; PageRank]" • Handle cyclic models" Center for Science & Engineering of Cyber Security How do we effectively analyze the huge attack model? ! Whitacre College of Engineering Approach! Estimate a probability distribution of intrusion for each attack state " • To obtain its relative chance of being attacked using the knowledge about exploitability" " 31 Center for Science & Engineering of Cyber Security Whitacre College of Engineering 32 8 Exploitability Exploitability • Atomic level! • Exploitability of each vulnerability • Atomic level! • Exploitability of each vulnerability (degrees 1à 10)" " "" Access Vector × Access Complexity × Authentication" " " E.g., remote, " local" E.g., low efforts to exploit" E.g., no or single authentication " " High exploitability " à High vulnerability" à Easy to exploit" Center for Science & Engineering of Cyber Security Whitacre College of Engineering 33 Exploitability Center for Science & Engineering of Cyber Security Whitacre College of Engineering 34 Markov Model • Approximates a probability distribution of dynamic behaviors randomly evolving to a stationary state • Atomic level! • Exploitability of each vulnerability (degrees 1à 10)" à Define the probability of intrusion of each attack point recursively Markov Property: The probability distribution for the future network intrusion only depends on the current states • Global level! • Exploitability of attack states in the network topology" " à Based on Markov Model (Applied to PageRank)" " à Repeat the computation until no change in the probability distribution approximation " Center for Science & Engineering of Cyber Security Whitacre College of Engineering 35 Center for Science & Engineering of Cyber Security Whitacre College of Engineering 36 9 Recurrence Equation Recurrence Equation h(u, v) = exploitability of exploits from state u to v rt(u) = probability of state u being attacked at time t d = probability that attackers continue attacking on a current path h(u, v) = exploitability of exploits from state u to v rt(u) = probability of state u being attacked at time t d = probability that attackers continue attacking on a current path If v is not an initial state u h( Chance of continuing attack Chances of entering v Chances of exploitability of u to v ) ,v u v … If v is an initial state + Chance of entering v from all other states Center for Science & Engineering of Cyber Security Whitacre College of Engineering 37 ExploitRank Algorithm a user access Center for (thus, Science & maintain Engineering of Cyber Security level in a victim host), and to38 Whitacre College of Engineering obtain a denial of service (thus, gain a root access level in the victim host), respectively. Local users can exploit the last vulnerability to bypass access restrictions by changing their access permissions of a home directory via the ftp, which causes its service program, wu-ftpd to, instead, allow access of the root directory. We annotate each configuration of the network in Figure 4 with its corresponding vulnerabilities and their associated labels. For example, IP2 has two vulnerabilities, namely CVE-2006-5794 (or v1) and CVE-2004-0148 (or v3). More details of these common standard vulnerabilities are described in [14, 17]. Although our approach can be applied to any form of a security model, in this study we use a host-centric attack graph model [5]. Suppose the goal of an attacker is to violate a security requirement. Based on the network configurations and the vulnerabilities shown in Figure 4, we can automatically generate a host-centric attack model as shown in Figure 5 a) by employing a model-checking tool such as NuSMV [4] as illustrated in [5]. ! ! ! Rank 5! ! 9.9 9.9 Node Intrusion 4.9 ! 9.9 Likelihood Rank 3! ! 4.9 S0 0.1500 ! S1 0.1287 Rank 2! 9.9 9.9 Rank 4! ! S 0.1658 A simple Illustration 2 S3 S4 Center for Science & Engineering of Cyber Security Whitacre College of Engineering 39 0.2548 0.3007 host-centric attack graph Center for Science &a) Engineering of Cyber Security The model obtained in F normalized exploitability w rithm to estimate a probab state i to state j. The norma of the probabilities of all p one. For example, there ar to advance from state s0, to ity values 4.9, 9.9, and 9.9, ristic value for exploiting v 4.9/(4.9 + 9.9 + 9.9) = 0.2. entry wij = w(i, j) is shown in the algorithm is the seco fined in Equation (3).! ! Table 3. Ranking r ! 3.9 4.9 Rank 1! b) exploit-based analysis graph Whitacre College of Engineering 40 Fig. 5. Attack model analysis of the network in Figure 4. Each state is labeled by a tuple representing a host name and its access level obtained by an attacker. Thus, (Attacker, root) is an initial state since an attacker has a root access privilege on his own machine. The attacker’s goal is to obtain a root access to IP2 and thus, (IP2, root) represents a goal state. As shown in Figure 5 b), we rename the states (Attacker, root), (IP1, root), (IP1, user), (IP2, user) and (IP2, root) as s0, s1, s2, s3, and s4, respectively. ! ! Table 2. Vulnerability and exploitability. Fig. 6. Normalized exploitab Applying the heuristics tRank algorithm, the resu host-centric attack model a ble 3. We then apply Mehta not employ the exploitabilit shown in the second colum As shown in Table 3, th apply the heuristics is < s4 and otherwise, < s4, s3, s0, s is applied (i.e., Mehta et al order of likelihood of intru ability. Both results sugge likelihood of being attack most vulnerable). 10 5 5 (thus, maintain a user access level in a victim host), and to (thus, maintain a user access level in a victim host), and to obtain a denial of service (thus, gain a root access level in the obtain a denial of service (thus, gain a root access level in the victim host), respectively. Local users can exploit the last vulvictim host), respectively. Local users can exploit the last vulnerability to bypass access restrictions by changing their acnerability to bypass access restrictions by changing their access permissions of a home directory via the ftp, which causes cess permissions of a home directory via the ftp, which causes its service program, wu-ftpd to, instead, allow access of the its service program, wu-ftpd to, instead, allow access of the root directory. We annotate each configuration of the network Fig. 6. Normalized exploitability of the analysis graph in Figure 5 b) root directory. We annotate each configuration of the network Fig. 6. Normalized exploitability of the analysis graph in Figure 5 b) in Figure 4 with its corresponding vulnerabilities and their in Figure 4 with its corresponding vulnerabilities and their The model obtained in Figure 5 b) is useful in computing a associated labels. For example, IP2 has two vulnerabilities, The model obtained in Figure 5 b) is useful in computing a associated labels. For example, IP2 has two vulnerabilities, normalized exploitability w(i, j) used in the ExploitRank algonamely CVE-2006-5794 (or v1normalized ) and CVE-2004-0148 (or v3). exploitability w(i, j) used in the ExploitRank algonamely CVE-2006-5794 (or v1) and CVE-2004-0148 (or v3). rithm to estimate a probability of advancing from attack in More details of these common standard vulnerabilities are of advancing rithm to estimate a probability from attack in More details of these common standard vulnerabilities are state i to state j. The normalization is required so that the sum described in [14, 17]. state i to state j. The normalization is required so that the sum described in [14, 17]. of the probabilities of all possible attack transitions would be Although our approach can be to any form of possible a seof applied the probabilities of all attack transitions would be Although our approach can be applied to any form of a seone. For example, there are three possible exploits applicable curity model, in this study we one. use aFor host-centric graph example, attack there are three possible exploits applicable curity model, in this study we use a host-centric attack graph to advance from state s0, to states s1, s2 and s3 with exploitabilmodel [5]. Suppose the goal of to anadvance attacker from is to violate secustate s0,ato states s1, s2 and s3 with exploitabilmodel [5]. Suppose the goal of In anMehta attacker to violate a secuity values 4.9, 9.9, and 9.9, respectively. The normalized heuetisal.ʼs approach" rity requirement. Based on the ity network and respectively. the valuesconfigurations 4.9, 9.9, and 9.9, The normalized heurity requirement. Based on the network configurations and the ristic value for exploiting v2 from s0 to s1 can be computed as vulnerabilities shown in chance Figure ristic 4,towe can automatically genervalue for exploiting vof • Each node has equal be attacked – no use 2 from s0 to s1 can be computed as 4.9/(4.9 + 9.9 + 9.9) = 0.2. A complete weight matrix, whose vulnerabilities shown in Figure 4, we can automatically generate a host-centric attack model 4.9/(4.9 as shown+in Figure a) 0.2. by em9.9 + 9.9) = A complete weight matrix, whose the degree of vulnerability "" 5shown entry wij = w(i, j) is shown in Figure 6. Note that in fact w(i, j) ate a host-centric attack model as shown in Figure 5 a) by em- exploitability w(i, j) is [4] in Figure 6. Note that in fact w(i, j) ploying a model-checking toolentry suchwas as illusij =NuSMV in the algorithm is the second factor of the function gt(v) deploying a model-checking tool" such as NuSMV [4] as illusin the algorithm is the second factor of the function gt(v) detrated in [5]. ! fined in Equation (3).! trated in [5]. ! fined in Equation (3).! Our Approach! ! Mehta et al.ʼs Approach! ! ! Table 3. Ranking results on the attack model. ! From s0 (9.9)" Table 3. Ranking results on the attack model. ! ! Rank 5! ! From! s0-s3 (9.9, 9.9)" Rank 5! ! ! " 4.9 9.9 9.9 ! 9.9 9.9 4.9 ! 9.9 Rank 3! ! 9.9 Rank 4! 4.9 ! 4.9 From s0" ! ! Rank 2! 9.9 9.9 Rank 3! From s0-s3" Rank 2!Rank 4! 9.9 9.9 ! Rank 3! ! Rank 2! Rank 1! From s0 (4.9)" Some Comparisons From s0" From s0-s2" From s0-s3" 3.9 4.9 Rank 1! More complex attack model From s0-s2 (9.9, 4.9)"4.9 From s0-s3 (9.9, 4.9)" Rank 1! 3.9 Applying the heuristics obtained in Figure 6 to the ExploiApplying the heuristics obtained in Figure 6 to the Exploi- a) host-centric attack graph b) exploit-based analysis graph tRank algorithm, the results of ranking attack states in the b) exploit-based analysis graph tRank algorithm, attack states in the More exposuresthe + ! results of ranking host-centric attack model are shown in the first column of TaFig. 5. Attack model analysis of the networkattack in Figure 4. host-centric model are shown in the first column of TaMore exposures! Fig. 5. Attack model analysis of the network in Figure 4. Easier exploit vulnerability! ble 3. We then apply Mehta et al.’s ranking approach that does a) host-centric attack graph ble 3. We then apply Mehta et al.’s ranking approach that does not employ the exploitability heuristic and obtain the results as Each state is labeled by a tuple representing host name and not employ the aexploitability heuristic and obtain the results as Engineering of Cyber Security Each state is labeled by a Center tupleforrepresenting a host name 41 Science & Engineering of Cyber Securityand Whitacre College of Engineering Center column for Science &of Whitacre College of Engineering shown in the second Table 3. its access level obtained by an shown attacker. (Attacker, root) in Thus, the second column of Table 3. its access level obtained by an attacker. Thus, (Attacker, root) As shown in Table 3, the ranking result obtained when we is an initial state since an attacker has a root access privilege As shown in Table 3, the ranking result obtained when we is an initial state since an attacker has a root access privilege apply the heuristics is < s4, s3, s2, s0, s1 > (i.e., our approach) on his own machine. The attacker’s goal is to obtain a root apply the heuristics is < s4, s3, s2, s0, s1 > (i.e., our approach) on his own machine. The attacker’s goal is to obtain a root and otherwise, < s , s3, s0, s1, s2 > is obtained when no heuristic access to IP2 and thus, (IP2, root) represents a goal state. As and otherwise, < s4, s3, s0, s1, s2 > is obtained when no4 heuristic access to IP2 and thus, (IP2, root) represents a goal state. As shown in Figure 5 b), we rename the states (Attacker, root), is applied (i.e., Mehta et al.’s approach). The ranking is in the shown in Figure 5 b), we rename the states (Attacker, root), is applied (i.e., Mehta et al.’s approach). The ranking is in the (IP1, root), (IP1, user), (IP2, user) and (IP2, root) as s0, s1, s2, order of likelihood of intrusion based on vulnerability exploit(IP1, root), (IP1, user), (IP2, user) and (IP2, root) as s0, s1, s2, order of likelihood of intrusion based on vulnerability exploits3, and s4, respectively. ! ability. Both results suggest that s4 has the highest (relative) s3, and s4, respectively. ! ability. Both results suggest that s4 has the highest (relative) ! likelihood of being attacked (i.e., highest exploitability and ! of being attacked (i.e., highest exploitability and Table 2. Vulnerability likelihood and exploitability. most vulnerable). Table 2. Vulnerability and exploitability. most vulnerable). To further compare the ranking results, if we ignore s0 in To further compare the ranking results, if we ignore s0 in both ranking lists, both ranking orders generally agree except both ranking lists, both ranking orders generally agree except a conflicting case of ranking order between s1 and s2Model . Consider • Hewett, R.; Kijsanayothin, P., "Host-Centric Checking for Network Vulnerability • Current state of security practices help guard against" a conflicting case of ranking order between s1 and s2. Consider Analysis," Computer Applications Conference, attackers from the initial state. AsSecurity shown in Figure 5 b), 2008. to ACSAC 2008. Annual , attackers shown in Figure 5vol., b), to • illegitimate network entry access " from the initial! state. Asreach no., pp.225,234, 8-12 Dec, 2008, doi: 10.1109/ACSAC.2008.15 " ! state s1 (e.g., from s0, s2 or s3) requires exploiting vulreach state s1 (e.g., from s0, s2 or s3) requires exploiting vul• Kijsanayothin, P.; Hewett, R., "Analytical Approach to Attack nerability v2, whereas to reach state s2 (e.g., from s0 or s3) re- Graph Analysis for Table 2 shows the and exploitability computed for each of the state • network intrusion network infection" nerability v , whereas to reach s (e.g., from s or s ) reTable 2 shows the exploitability computed for each of the 2 2 3 Network Security," Availability, Reliability, and Security, 2010. ARES '10 International exploiting0 vulnerability v1. However, according to the relevant vulnerabilities obtainedquires publically known CVSS v . quires exploiting to the on , vol., BUT attackers can CVSS still attack from the network by vulnerability exploiting relevant vulnerabilities obtained from publically known no., pp.25,32, 15-18 Feb, 2010, doi: 10.1109/ARES.2010.21" 1 However, accordingConference CVSS standard, since exploitability(v 1) = 9.9 but exploitabilas described in previous section"!!Based on heuristic values in CVSS standard, since exploitability(v ) = 9.9 but exploitabil• Noel, S.; Jajodia, S., "Understanding complex network attack graphs through 1 as described in previous section"!!Based on heuristic values in network vulnerabilities (due to configuration or software ity(v ) = 4.9, v1 is more vulnerable than v2. Therefore, it should Table 2, we obtained the corresponding attack graph anality(v2) = 4.9, v1 is morefor vulnerable than 2v2. Therefore, itclustered shouldadjacency matrices," Computer Security Applications Conference, 21st Table 2, we obtained the corresponding attack graph for analbe easier to reach s . For example, from initial state s , reach2 0 ysis as shown in Figure 5 b), where we replace thes2state errors)" vol., no., pp.10 pp.,169, 5-9 Dec, 2005, doi: 10.1109/CSAC.2005.58" be easier to reach . Fortransiexample, from initial state s0,Annual , reachysis as shown in Figure 5 b), where we replace the state transiing s requires v1 exploit to aJ. vWing, or aanalysis chain ofofattack graphs," in CSFW 2 exploit Jha, S.,compared O. Sheyner, and "Two formal tions of the vulnerability corresponding exploitaing sby v1 exploit compared to a 2v2 exploit or a• chain of 2 requires One remedy is toexploitaaim to exploits prevent critical possible attacks tions of the vulnerability exploits• by corresponding v and v exploits to reach s1. Therefore, s2 should higherSecurity Foundations. 1 1 '02: Proceedings of the 15th IEEE workshoprank on Computer bility values in Table 2. v and v exploits to reach s . Therefore, s should rank higher 1 1 1 2 bility values in Table 2. from these vulnerabilities (notthan justs entry points)" than s1. This intuitive reasoning to our Society, ranking order Washington, DC,conforms USA: IEEE Computer p. 49, 2002." 1. This intuitive reasoning conforms to our ranking order Conclusions References • Mehta, V., C. Bartzis, H. Zhu, E. M. Clarke, and J. M. Wing, "Ranking attack graphs," in Recent Advances in Intrusion Detection, pp. 127-144, 2006. " • Schiffman, Cisco CIAG, A Complete Guide to the Common Vulnerability Scoring System (CVSS), Forum Incident Response and Security Teams (http://www.first.org/)" • Sheyner, O., J. Haines, S. Jha, R. Lippmann, and J. Wing, "Automated generation and analysis of attack graphs," Proc. of the IEEE Symposium on Security and Privacy, pp. 273-284, 2002. " " • We give an example of how" • Attack model can be automatically constructed and used for security management" • This helps address scalability of network protection" Center for Science & Engineering of Cyber Security 42 Whitacre College of Engineering 43 Center for Science & Engineering of Cyber Security Whitacre College of Engineering 44 11