Abstract
Managing numerous security vulnerabilities has long been a difficult and daunting task especially due to the complexity, heterogeneity, and various operational constraints of the network. In this paper, we focus on the task of mitigating and managing network-device-specific vulnerabilities automatically and intelligently. We achieve the goal by a scalable, interactive, topology-aware framework that can provide mitigation actions at selectively chosen devices. The intuition behind our work is that more and more network devices are becoming security-capable so that they can be collectively used to achieve security goals while satisfying certain network policies.
The intelligence utilizes integer programming to optimize a quantifiable objective conforming to the policy of a given network. An example would be to find the minimum number of network devices to install filters to effectively protect the entire network against potential attacks from external untrusted sources. The constraints of the integer programming are mainly based on the network topology and settings of vulnerable devices and untrusted sources. Our novel implementation uses an iterative algorithm to scale to networks of tens of thousands of nodes, and we demonstrate the effectiveness of our framework using both synthetic and realistic network topologies. Besides scalability, our tool is also operationally easy to use by enabling interactivity to input additional constraints during run-time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Cisco IOS HTTP Server Code Injection Vulnerability, http://tools.cisco.com/security/center/viewAlert.x?alertId=10102
Cisco IOS Software UDP Packet Processing Denial of Service Vulnerability, http://tools.cisco.com/security/center/viewAlert.x?alertId=17765
Cisco Intrusion Prevention System, http://www.cisco.com/en/US/products/sw/secursw/ps2113/index.html
Multiple Vendor DNS Implementations Insufficient Entropy Vulnerability, http://tools.cisco.com/security/center/viewAlert.x?alertId=16183
Grote, A., Funke, R., Heiss, H.-U.: Performance evaluation of firewalls in gigabit-networks. In: Proc. 1999 Symposium on Performance Evaluation of Computer and Telecommunication Systems (1999), http://www.kbs.cs.tu-berlin.de/publications/fulltext/GFH99.pdf
Capretta, V., Stepien, B., Felty, A., Matwin, S.: Formal correctness of conflict detection for firewalls. In: FMSE 2007: Proceedings of the 2007 ACM Workshop on Formal Methods in Security Engineering, pp. 22–30 (2007)
Introduction to Cisco Inventory and Reporting, http://www.cisco.com/en/US/docs/net_mgmt/inventory_and_reporting/User_Guides/Introduction_to_Cisco_Inventory_and_Reporting.html
David System, a network management system (nms), http://www.hadden.pl/en/index.php
Introduction to OVAL: A new language to determine the presence of software vulnerabilities (2003), http://oval.mitre.org/documents/docs03/intro/intro.html
Cisco Intellishield, http://www.cisco.com/security/
Todtmann, B., Rathgeb, E.P.: Integrated management of distributed packet filter configurations in carrier-grade ip networks. In: International Conference on Networking, p. 44 (2007)
NetMRI, http://www.netcordia.com/
Cisco Multiple Vulnerabilities, http://secunia.com/advisories/23867/
Old, J.L., Buchanan, W., Graves, J., Saliou, L.: Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. In: 5th European Conference on Information Warfare and Security, ECIW (2006)
CPLEX, High-performance software for mathematical programming and optimization, http://www.ilog.com/products/cplex/
GTITM, Modeling Topology of Large Internetworks, http://www.cc.gatech.edu/projects/gtitm/
Bartal, Y., Mayer, A., Nissim, K., Wool, A.: Firmato: A novel firewall management toolkit. ACM Trans. Comput. Syst. 22(4), 381–420 (2004)
Mayer, A., Wool, A., Ziskind, E.: Fang: A firewall analysis engine. In: SP 2000: Proceedings of the 2000 IEEE Symposium on Security and Privacy, p. 177 (2000)
Al-shaer, E., Hamed, H., Boutaba, R., Hasan, M.: Conflict classification and analysis of distributed firewall policies. IEEE Journal on Selected Areas in Communications 23, 2069–2084 (2005)
Bellovin, S.M.: Distributed firewalls. Login, 37–39 (1999)
Ioannidis, S., Keromytis, A.D., Bellovin, S.M., Smith, J.M.: Implementing a distributed firewall. In: CCS 2000: Proceedings of the 7th ACM Conference on Computer and Communications Security, pp. 190–199 (2000)
Guttman, J.D.: Filtering postures: local enforcement for global policies. In: SP 1997: Proceedings of the 1997 IEEE Symposium on Security and Privacy, p. 120. IEEE Computer Society (1997)
Uribe, T.E., Cheung, S.: Automatic analysis of firewall and network intrusion detection system configurations. In: FMSE 2004: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, pp. 66–74 (2004)
Ou, X., Govindavajhala, S., Appel, A.W.: Mulval: a logic-based network security analyzer. In: SSYM 2005: Proceedings of the 14th Conference on USENIX Security Symposium (2005)
Tödtmann, B., Rathgeb, E.P.: Anticipatory distributed packet filter configurations for carrier-grade ip networks. Comput. Netw. 51(10), 2565–2579 (2007)
Todtmann, B., Rathgeb, E.P.: Advanced packet filter placement strategies for carrier-grade ip-networks. In: AINAW 2007: Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops, vol. 1, pp. 415–423 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Qian, Z., Mao, Z.M., Rayes, A., Jaffe, D. (2012). Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks. In: Rajarajan, M., Piper, F., Wang, H., Kesidis, G. (eds) Security and Privacy in Communication Networks. SecureComm 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 96. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31909-9_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-31909-9_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31908-2
Online ISBN: 978-3-642-31909-9
eBook Packages: Computer ScienceComputer Science (R0)