Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Using Network Tainting to Bound the Scope of Network Ingress Attacks

Published

Author(s)

Peter M. Mell, Richard Harang

Abstract

This research describes a novel security metric, network taint, which is related to software taint analysis. We use it here to bound the possible malicious influence of a known compromised node through monitoring and evaluating network flows. The result is a dynamically changing defense-in-depth map that shows threat level indicators gleaned from monotonically decreasing threat chains. We augment this analysis with concepts from the complex networks research area in forming dynamically changing security perimeters and measuring the cardinality of the set of threatened nodes within them. In providing this, we hope to advance network incident response activities by providing a rapid automated initial triage service that can guide and prioritize investigative activities.
Conference Dates
June 30-July 2, 2014
Conference Location
San Francisco, CA
Conference Title
Eighth International Conference on Software Security and Reliability (SERE 2014)

Keywords

network tainting, complex networks, scale-free, security

Citation

Mell, P. and Harang, R. (2014), Using Network Tainting to Bound the Scope of Network Ingress Attacks, Eighth International Conference on Software Security and Reliability (SERE 2014), San Francisco, CA, [online], https://doi.org/10.1109/SERE.2014.34 (Accessed December 2, 2024)

Issues

If you have any questions about this publication or are having problems accessing it, please contact reflib@nist.gov.

Created July 1, 2014, Updated November 10, 2018