|
|
|
|
|
|
|
|
| ( 1 of 1 ) |
| United States Patent | 5,485,409 |
| Gupta , et al. | January 16, 1996 |
The present invention provides a penetration-analysis method, which (1) provides a systematic approach to penetration analysis, (2) enables the verification of penetration-resistance properties, and (3) is amenable to automation. An Automated Penetration Analysis (APA) tool is provided, to support the penetration analysis method. The penetration-analysis system and method is based on a theory of penetration-resistant computer systems, a model of penetration analysis, and a unified representation of penetration patterns. The theory consists of the Hypothesis of Penetration-Resistant Systems and a set of design properties that characterize resistance to penetration. The penetration-analysis model defines a set of states, a state-invariant for penetration resistance, and a set of rules that can be applied for analyzing the penetration vulnerability of a system. An interpretation of the Hypothesis of Penetration-Resistant Systems within a given system provides the Hypothesis of Penetration Patterns, which enables the present invention to define a unified representation for a large set of penetration instances as missing check patterns.
| Inventors: | Gupta; Sarbari (Rockville, MD), Gligor; Virgil D. (Chevy Chase, MD) |
|---|---|
| Assignee: |
International Business Machines Corporation
(Armonk,
NY)
|
| Family ID: | 25366644 |
| Appl. No.: | 07/875,945 |
| Filed: | April 30, 1992 |
| Current U.S. Class: | 726/25; 713/164 |
| Current CPC Class: | G06F 21/577 (20130101) |
| Current International Class: | G06F 21/00 (20060101); G06F 1/00 (20060101); H04L 009/00 (); G06F 013/00 () |
| Field of Search: | ;364/580,570,918.7,949.81,286.4,286.5,286.6,419 ;395/50,51,61,911,912,913,914,915,916,917,918,725 ;340/825.31,825.34 ;380/4 |
| 4649515 | March 1987 | Thompson et al. |
| 4956769 | September 1990 | Smith |
| 5060279 | October 1991 | Crawford et al. |
| 5099436 | March 1992 | McCown et al. |
| 5133063 | July 1992 | Naito et al. |
| 5161245 | November 1992 | Fenwick |
| 5197004 | March 1993 | Sobotka et al. |
Gupta et al., "Towards a Theory of Penetration-Resistant Systems and its Applications", Proc. of the 4th IEEE Workshop on Computer Security Foundations, Franconia, N.H., pp. 62-78, Jun. 1991. . Jiang et al., "Distributed System Security Research at FSD Gaithersburg", IBM Document No. FSDSS-9202, Jan. 8, 1992. . Gupta et al., "Experience with a Penetartion Analysis Method and Tool", U of MD, Electrical Engineering Department, Technical Report No. 2881, Apr. 1992. . Tsai et al., "Distributed System and Security Management with Centralized Control", 1992 EurOpen/USENIX Workshop, Jersey, U.K., Apr. 6-9, 1992.. |
|
|