Companies and network operators perform risk assessment to inform policy-making, guide infrastructure investments or to comply with security standards such as ISO 27001. Due to the size and complexity of these networks, risk assessment techniques such as attack graphs or trees describe the attacker with a finite set of rules. This characterization of the attacker can easily miss attack vectors or overstate them, potentially leading to incorrect risk estimation. In this work, we propose the first methodology to justify a rule-based attacker model. Conceptually, we add another layer of abstraction on top of the symbolic model of cryptography, which reasons about protocols and abstracts cryptographic primitives. This new layer reasons about Internet-scale networks and abstracts protocols. We show, in general, how the soundness and completeness of a rule-based model can be ensured by verifying trace properties, linking soundness to safety properties and completeness to liveness properties. We then demonstrate the approach for a recently proposed threat model that quantifies the confidentiality of email communication on the Internet, including DNS, DNSSEC, and SMTP. Using off-the-shelf protocol verification tools, we discover two flaws in their threat model. After fixing them, we show that it provides symbolic soundness.
翻译:由于这些网络的规模和复杂性,攻击图或树木等风险评估技术以一套有限的规则描述攻击者。这种攻击者的特点很容易地错失攻击矢量或过多地表示攻击者,从而可能导致不正确的风险估计。在这项工作中,我们提出第一种方法来证明基于规则的攻击者模式的合理性。概念上,我们在象征性的加密模型之上再增加一层抽象,这是协议和摘要加密原始物的理由。关于因特网规模网络和摘要协议的这种新的层次原因。我们一般地表明,如何通过核实跟踪特性、将稳妥性与安全特性和完整性与生活特性联系起来,确保基于规则的模式的健全性和完整性。我们然后展示最近提出的威胁模式的方法,该模式将互联网电子邮件通信的保密性(包括DNS、DNSSECS和SMTP)进行量化。我们利用离线协议核查工具,发现基于规则的模式在威胁性模型中存在两个缺陷。我们随后以象征性的方式展示了这些缺陷。