Hyökkäysten taksonomia
John D. Howard esittää väitöskirjasssaan
:
An Analysis of Security Incidents on the Internet 1989-1995
määritelmän tietoturvalle:
"Computer security is preventing attackers from achieving objectives
through unauthorized access or unauthorized use of computers and networks."
Sen pohjalta hän tiivistää
(luvussa 6)
alla olevaan taulukkoon taksonomian, jossa
tietokoneeseen tai verkkoon hyökkäävä voidaan luokitella ensimmäisen
sarakkeen mukaisesti ja tavoite (motivaatio), johon hän tähtää, on jokin
viimeisessä sarakkeessa mainituista. Tavoitteeseen päästään jonkin
tietoon liittyvän tuloksen kautta.
Tulos muodostuu siitä, että jollain välineellä pääsee käsiksi tietoon.
Pääsy on jaoteltu neljään vaiheeseen.
Ideana on siis, että erilaisia hyökkäyksiä voidaan mallintaa
valitsemalla kustakin sarakkeesta yksi (tai usea) vaihtoehto.
Attackers |
|
Tools |
|
----------------- Access ----------------- |
|
Results |
|
Objectives |
Hackers |
|
User Command |
|
Implementation Vulnerability |
|
Unauthorized Access |
|
Files |
|
Corruption of Information |
|
Challenge, Status |
Spies |
==> |
Script or Program |
==> |
Design Vulnerability |
=> |
Unauthorized Use |
=> |
Processes |
=> |
Data in Transit |
==> |
Disclosure of Information |
==> |
Political Gain |
Terrorists |
|
Autonomous Agent |
|
Configuration Vulnerability |
|
Theft of Service |
|
Financial Gain |
Corporate Raiders |
|
Toolkit |
|
Denial-of-service |
|
Damage |
Professional Criminals |
|
Distributed Tool |
|
|
Vandals |
|
Data Tap |
|
|
Muita taksonomioita
Landwehr C.E., Bull A.R., McDermott J.P., Choi W.S.:
A taxonomy of computer program security flaws.
ACM Computing Surveys,
Vol.26, No. 3 (Sept. 1994), pp. 211-254.
Tiivistelmä
:
An organized record of actual flaws can be useful to computer system
designers, programmers, analysts, administrators, and users. This
survey provides a taxonomy for computer program security flaws, with
an Appendix that documents 50 actual security flaws. These flaws have
all been described previously in the open literature, but in widely
separated places. For those new to the field of computer security,
they provide a good introduction to the characteristics of security
flaws and how they can arise. Because these flaws were not randomly
selected from a valid statistical sample of such flaws, we make no
strong claims concerning the likely distribution of actual security
flaws within the taxonomy. However, this method of organizing security
flaw data can help those who have custody of more representative
samples to organize them and to focus their efforts to remove and,
eventually, to prevent the introduction of security flaws.
Taimur Aslamin MS-thesis vuodelta 1995:
A Taxonomy of Security Faults in the Unix Operating System
(ks. erityisesti sivu 39).
Lyhyempi
versio samasta aiheesta (vuodelta 1996, 10 sivua).