Chapter 23- Vulnerability Analysis.ppt
《Chapter 23- Vulnerability Analysis.ppt》由会员分享,可在线阅读,更多相关《Chapter 23- Vulnerability Analysis.ppt(133页珍藏版)》请在麦多课文档分享上搜索。
1、June 1, 2004,Computer Security: Art and Science 2004 Matt Bishop,Slide #23-1,Chapter 23: Vulnerability Analysis,Background Penetration Studies Example Vulnerabilities Classification Frameworks Theory of Penetration Analysis,June 1, 2004,Computer Security: Art and Science 2004 Matt Bishop,Slide #23-2
2、,Overview,What is a vulnerability? Penetration studies Flaw Hypothesis Methodology Examples Vulnerability examples Classification schemes RISOS, PA, NRL Taxonomy, Aslams Model Theory of penetration analysis Examples,June 1, 2004,Computer Security: Art and Science 2004 Matt Bishop,Slide #23-3,Definit
3、ions,Vulnerability, security flaw: failure of security policies, procedures, and controls that allow a subject to commit an action that violates the security policy Subject is called an attacker Using the failure to violate the policy is exploiting the vulnerability or breaking in,June 1, 2004,Compu
4、ter Security: Art and Science 2004 Matt Bishop,Slide #23-4,Formal Verification,Mathematically verifying that a system satisfies certain constraints Preconditions state assumptions about the system Postconditions are result of applying system operations to preconditions, inputs Required: postconditio
5、ns satisfy constraints,June 1, 2004,Computer Security: Art and Science 2004 Matt Bishop,Slide #23-5,Penetration Testing,Testing to verify that a system satisfies certain constraints Hypothesis stating system characteristics, environment, and state relevant to vulnerability Result is compromised syst
6、em state Apply tests to try to move system from state in hypothesis to compromised system state,June 1, 2004,Computer Security: Art and Science 2004 Matt Bishop,Slide #23-6,Notes,Penetration testing is a testing technique, not a verification technique It can prove the presence of vulnerabilities, bu
7、t not the absence of vulnerabilities For formal verification to prove absence, proof and preconditions must include all external factors Realistically, formal verification proves absence of flaws within a particular program, design, or environment and not the absence of flaws in a computer system (t
8、hink incorrect configurations, etc.),June 1, 2004,Computer Security: Art and Science 2004 Matt Bishop,Slide #23-7,Penetration Studies,Test for evaluating the strengths and effectiveness of all security controls on system Also called tiger team attack or red team attack Goal: violate site security po
9、licy Not a replacement for careful design, implementation, and structured testing Tests system in toto, once it is in place Includes procedural, operational controls as well as technological ones,June 1, 2004,Computer Security: Art and Science 2004 Matt Bishop,Slide #23-8,Goals,Attempt to violate sp
10、ecific constraints in security and/or integrity policy Implies metric for determining success Must be well-defined Example: subsystem designed to allow owner to require others to give password before accessing file (i.e., password protect files) Goal: test this control Metric: did testers get access
11、 either without a password or by gaining unauthorized access to a password?,June 1, 2004,Computer Security: Art and Science 2004 Matt Bishop,Slide #23-9,Goals,Find some number of vulnerabilities, or vulnerabilities within a period of time If vulnerabilities categorized and studied, can draw conclusi
12、ons about care taken in design, implementation, and operation Otherwise, list helpful in closing holes but not more Example: vendor gets confidential documents, 30 days later publishes them on web Goal: obtain access to such a file; you have 30 days Alternate goal: gain access to files; no time limi
13、t (a Trojan horse would give access for over 30 days),June 1, 2004,Computer Security: Art and Science 2004 Matt Bishop,Slide #23-10,Layering of Tests,External attacker with no knowledge of system Locate system, learn enough to be able to access it External attacker with access to system Can log in,
14、or access network servers Often try to expand level of access Internal attacker with access to system Testers are authorized users with restricted accounts (like ordinary users) Typical goal is to gain unauthorized privileges or information,June 1, 2004,Computer Security: Art and Science 2004 Matt B
15、ishop,Slide #23-11,Layering of Tests (cont),Studies conducted from attackers point of view Environment is that in which attacker would function If information about a particular layer irrelevant, layer can be skipped Example: penetration testing during design, development skips layer 1 Example: pene
16、tration test on system with guest account usually skips layer 2,June 1, 2004,Computer Security: Art and Science 2004 Matt Bishop,Slide #23-12,Methodology,Usefulness of penetration study comes from documentation, conclusions Indicates whether flaws are endemic or not It does not come from success or
17、failure of attempted penetration Degree of penetrations success also a factor In some situations, obtaining access to unprivileged account may be less successful than obtaining access to privileged account,June 1, 2004,Computer Security: Art and Science 2004 Matt Bishop,Slide #23-13,Flaw Hypothesis
18、Methodology,Information gathering Become familiar with systems functioning Flaw hypothesis Draw on knowledge to hypothesize vulnerabilities Flaw testing Test them out Flaw generalization Generalize vulnerability to find others like it (maybe) Flaw elimination Testers eliminate the flaw (usually not
19、included),June 1, 2004,Computer Security: Art and Science 2004 Matt Bishop,Slide #23-14,Information Gathering,Devise model of system and/or components Look for discrepancies in components Consider interfaces among components Need to know system well (or learn quickly!) Design documents, manuals help
20、 Unclear specifications often misinterpreted, or interpreted differently by different people Look at how system manages privileged users,June 1, 2004,Computer Security: Art and Science 2004 Matt Bishop,Slide #23-15,Flaw Hypothesizing,Examine policies, procedures May be inconsistencies to exploit May
21、 be consistent, but inconsistent with design or implementation May not be followed Examine implementations Use models of vulnerabilities to help locate potential problems Use manuals; try exceeding limits and restrictions; try omitting steps in procedures,June 1, 2004,Computer Security: Art and Scie
22、nce 2004 Matt Bishop,Slide #23-16,Flaw Hypothesizing (cont),Identify structures, mechanisms controlling system These are what attackers will use Environment in which they work, and were built, may have introduced errors Throughout, draw on knowledge of other systems with similarities Which means the
23、y may have similar vulnerabilities Result is list of possible flaws,June 1, 2004,Computer Security: Art and Science 2004 Matt Bishop,Slide #23-17,Flaw Testing,Figure out order to test potential flaws Priority is function of goals Example: to find major design or implementation problems, focus on pot
24、ential system critical flaws Example: to find vulnerability to outside attackers, focus on external access protocols and programs Figure out how to test potential flaws Best way: demonstrate from the analysis Common when flaw arises from faulty spec, design, or operation Otherwise, must try to explo
25、it it,June 1, 2004,Computer Security: Art and Science 2004 Matt Bishop,Slide #23-18,Flaw Testing (cont),Design test to be least intrusive as possible Must understand exactly why flaw might arise Procedure Back up system Verify system configured to allow exploit Take notes of requirements for detecti
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- CHAPTER23VULNERABILITYANALYSISPPT
