Skip to main content

Using SPIN and Eclipse for Optimized High-Level Modeling and Analysis of Computer Network Attack Models

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3639))

Abstract

Advanced attack sequences combine different kinds of steps (e.g. attacker, protocol, and administration steps) on multiple networked systems. We propose a SPIN based approach for formal modeling and analysis of such scenarios. Our approach is especially suited for scenarios were protocol and network level aspects matter simultaneously. Typical attack sequences and not yet considered variants can be automatically found. The development of scenario models is supported by a modeling framework and the use of the high-level process specification language cTLA. A compiler translates the high-level cTLA models to Promela. This allows the powerful model-checking tool SPIN to be employed for analysis. Through integration of the compiler and SPIN into the Eclipse platform both model development and analysis are facilitated.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alur, R., Brayton, R.K., Henzinger, T.A., Qadeer, S., Rajamani, S.K.: Partial order reduction in symbolic state space exploration. In: Grumberg, O. (ed.) CAV 1997. LNCS, vol. 1254, pp. 340–351. Springer, Heidelberg (1997)

    Google Scholar 

  2. Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Transactions on Networking 1, 600–610 (1993)

    Article  Google Scholar 

  3. Ammann, P., Ritchey, R.: Using Model Checking to Analyze Network Vulnerabilities. In: IEEE Symposium on Security and Privacy (May 2000)

    Google Scholar 

  4. Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. Proceedings of the Royal Society 426(1871) (1989)

    Google Scholar 

  5. Blackhat Europe Conference: Routing and Tunneling Protocol Attacks (2001), http://www.blackhat.com/html/bh-europe-01/bh-europe-01-speakers.html#FX

  6. Bolour, A.: Notes on the Eclipse Plug-in architecture, http://www.eclipse.org/articles/Article-Plug-in-architecture/plugin_architecture.html

  7. Balser, M., Reif, W., et al.: Formal System Development with KIV. In: Maibaum, T. (ed.) FASE 2000. LNCS, vol. 1783, p. 363. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  8. Eclipse.org: Main Page (2005), http://www.eclipse.org

  9. Herrmann, P., Krumm, H.: A Framework for Modeling Transfer Protocols. Computer Networks 34, 317–337 (2000)

    Article  Google Scholar 

  10. Holzmann, G.J.: The SPIN Model Checker: Primer and Reference Manual. Addison Wesley, Reading (2003)

    Google Scholar 

  11. Kawauchi, K., Kitazawa, S., et al.: A Vulnerability Assessment Tool Using First-Order Predicate Logic. IPSJ SIGNotes Computer SECurity No.019 (2003)

    Google Scholar 

  12. Lamport, L.: The Temporal Logic of Actions. ACM Transactions on Programming Languages and Systems 16(3), 872–923 (1994)

    Article  Google Scholar 

  13. Leduc, G., Bonaventure, O., Leonard, L., et al.: Model-based Verification of a Security Protocol for Conditional Access to Services. Formal Methods in System Design 14(2), 171–191 (1999)

    Article  Google Scholar 

  14. Meadows, C.: The NRL Protocol Analyzer: An Overview. Journal of Logic Programming 26(2), 113–131 (1996)

    Article  MATH  Google Scholar 

  15. Maggi, P., Sisto, R.: Using SPIN to Verify Security Properties of Cryptographic Protocols. In: Bošnački, D., Leue, S. (eds.) SPIN 2002. LNCS, vol. 2318, pp. 187–204. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  16. Noel, S., O’ Berry, B., Ritchey, R.: Representing TCP/IP connectivity for topological analysis of network security. In: IEEE Computer Society (ed.) Proc. of the 18th Annual Computer Security Applications Conference, pp. 25–31 (2002)

    Google Scholar 

  17. Ramakrishnan, C., Sekar, R.: Model-Based Analysis of Configuration Vulnerabilities. Journal of Computer Security 10(1), 189–209 (2002)

    Google Scholar 

  18. Rothmaier, G., Krumm, H.: cTLA 2003 Description. Technical Report (2003), http://ls4-www.cs.uni-dortmund.de/RVS/MA/hk/cTLA2003description.pdf

  19. Rothmaier, G., Pohl, A., Krumm, H.: Analyzing Network Management Effects with SPIN and cTLA. In: Proc. of IFIP 18th WCC/SEC 2004, pp. 65–81 (2004)

    Google Scholar 

  20. Rothmaier, G.: cTLA Computer Network Specification Framework. Online Document, http://www4.cs.uni-dortmund.de/RVS/MA/hk/framework.html

  21. Ruys, T.C.: Towards Effective Model Checking. PhD Thesis, University of Twente (2001)

    Google Scholar 

  22. Svobodova, L.: Implementing OSI Systems. IEEE Journal on Selected Areas in Communications 7, 1115–1130 (1989)

    Article  MATH  Google Scholar 

  23. Verisign: Internet Security Intelligence Briefing, vol. 2(II) (November 2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rothmaier, G., Kneiphoff, T., Krumm, H. (2005). Using SPIN and Eclipse for Optimized High-Level Modeling and Analysis of Computer Network Attack Models. In: Godefroid, P. (eds) Model Checking Software. SPIN 2005. Lecture Notes in Computer Science, vol 3639. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11537328_19

Download citation

  • DOI: https://doi.org/10.1007/11537328_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28195-5

  • Online ISBN: 978-3-540-31899-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics