Abstract
Advanced attack sequences combine different kinds of steps (e.g. attacker, protocol, and administration steps) on multiple networked systems. We propose a SPIN based approach for formal modeling and analysis of such scenarios. Our approach is especially suited for scenarios were protocol and network level aspects matter simultaneously. Typical attack sequences and not yet considered variants can be automatically found. The development of scenario models is supported by a modeling framework and the use of the high-level process specification language cTLA. A compiler translates the high-level cTLA models to Promela. This allows the powerful model-checking tool SPIN to be employed for analysis. Through integration of the compiler and SPIN into the Eclipse platform both model development and analysis are facilitated.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Alur, R., Brayton, R.K., Henzinger, T.A., Qadeer, S., Rajamani, S.K.: Partial order reduction in symbolic state space exploration. In: Grumberg, O. (ed.) CAV 1997. LNCS, vol. 1254, pp. 340–351. Springer, Heidelberg (1997)
Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Transactions on Networking 1, 600–610 (1993)
Ammann, P., Ritchey, R.: Using Model Checking to Analyze Network Vulnerabilities. In: IEEE Symposium on Security and Privacy (May 2000)
Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. Proceedings of the Royal Society 426(1871) (1989)
Blackhat Europe Conference: Routing and Tunneling Protocol Attacks (2001), http://www.blackhat.com/html/bh-europe-01/bh-europe-01-speakers.html#FX
Bolour, A.: Notes on the Eclipse Plug-in architecture, http://www.eclipse.org/articles/Article-Plug-in-architecture/plugin_architecture.html
Balser, M., Reif, W., et al.: Formal System Development with KIV. In: Maibaum, T. (ed.) FASE 2000. LNCS, vol. 1783, p. 363. Springer, Heidelberg (2000)
Eclipse.org: Main Page (2005), http://www.eclipse.org
Herrmann, P., Krumm, H.: A Framework for Modeling Transfer Protocols. Computer Networks 34, 317–337 (2000)
Holzmann, G.J.: The SPIN Model Checker: Primer and Reference Manual. Addison Wesley, Reading (2003)
Kawauchi, K., Kitazawa, S., et al.: A Vulnerability Assessment Tool Using First-Order Predicate Logic. IPSJ SIGNotes Computer SECurity No.019 (2003)
Lamport, L.: The Temporal Logic of Actions. ACM Transactions on Programming Languages and Systems 16(3), 872–923 (1994)
Leduc, G., Bonaventure, O., Leonard, L., et al.: Model-based Verification of a Security Protocol for Conditional Access to Services. Formal Methods in System Design 14(2), 171–191 (1999)
Meadows, C.: The NRL Protocol Analyzer: An Overview. Journal of Logic Programming 26(2), 113–131 (1996)
Maggi, P., Sisto, R.: Using SPIN to Verify Security Properties of Cryptographic Protocols. In: Bošnački, D., Leue, S. (eds.) SPIN 2002. LNCS, vol. 2318, pp. 187–204. Springer, Heidelberg (2002)
Noel, S., O’ Berry, B., Ritchey, R.: Representing TCP/IP connectivity for topological analysis of network security. In: IEEE Computer Society (ed.) Proc. of the 18th Annual Computer Security Applications Conference, pp. 25–31 (2002)
Ramakrishnan, C., Sekar, R.: Model-Based Analysis of Configuration Vulnerabilities. Journal of Computer Security 10(1), 189–209 (2002)
Rothmaier, G., Krumm, H.: cTLA 2003 Description. Technical Report (2003), http://ls4-www.cs.uni-dortmund.de/RVS/MA/hk/cTLA2003description.pdf
Rothmaier, G., Pohl, A., Krumm, H.: Analyzing Network Management Effects with SPIN and cTLA. In: Proc. of IFIP 18th WCC/SEC 2004, pp. 65–81 (2004)
Rothmaier, G.: cTLA Computer Network Specification Framework. Online Document, http://www4.cs.uni-dortmund.de/RVS/MA/hk/framework.html
Ruys, T.C.: Towards Effective Model Checking. PhD Thesis, University of Twente (2001)
Svobodova, L.: Implementing OSI Systems. IEEE Journal on Selected Areas in Communications 7, 1115–1130 (1989)
Verisign: Internet Security Intelligence Briefing, vol. 2(II) (November 2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rothmaier, G., Kneiphoff, T., Krumm, H. (2005). Using SPIN and Eclipse for Optimized High-Level Modeling and Analysis of Computer Network Attack Models. In: Godefroid, P. (eds) Model Checking Software. SPIN 2005. Lecture Notes in Computer Science, vol 3639. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11537328_19
Download citation
DOI: https://doi.org/10.1007/11537328_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28195-5
Online ISBN: 978-3-540-31899-6
eBook Packages: Computer ScienceComputer Science (R0)