using capec for risk-based security testing

14
USING CAPEC FOR RISK-BASED SECURITY TESTING Fredrik Seehusen RASEN - 316853 1

Upload: phamthien

Post on 14-Feb-2017

225 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: USING CAPEC FOR RISK-BASED SECURITY TESTING

USING CAPEC FOR RISK-BASED SECURITY TESTING

Fredrik Seehusen

RASEN - 316853 1

Page 2: USING CAPEC FOR RISK-BASED SECURITY TESTING

Overview of method

RASEN - 316853 2

CAPEC

attack

patterns

Prioritized test

procedures

I: CAPEC to

risk model

(automated)

II: Risk

model

refinement

(manual)

III: Test

procedure

derivation

(semi-

automated)

Generic

risk

model

Target

specific risk

model

System

under test

CAPEC to

risk model

algorithm

Test procedure

prioritization

algorithm

Page 3: USING CAPEC FOR RISK-BASED SECURITY TESTING

Method overview cont.

RASEN - 316853 3

Page 4: USING CAPEC FOR RISK-BASED SECURITY TESTING

Method overview cont.

RASEN - 316853 4

� Criteria � C1: The risk assessment should not be too time

consuming. � C2: The risk assessment should help reduce the time

spent in testing. � C3: The risk assessment should help increase the

quality of the testing activity.

Risk-based

testing Risk assessment = Testing +

Page 5: USING CAPEC FOR RISK-BASED SECURITY TESTING

Step I: From CAPEC to Generic CORAS Risk Model

RASEN - 316853 5

CAPEC CORAS Risk model

Page 6: USING CAPEC FOR RISK-BASED SECURITY TESTING

Step I: Security attack in CORAS risk model

RASEN - 316853 6

Attacker name

Likelihood of attack

initiation

Attack name

Likelihood of attack

success

Name of vulnerability

Attack consequence

name

Attack impact name

Likelihood of attack

consequence

Consequence value

Page 7: USING CAPEC FOR RISK-BASED SECURITY TESTING

Step I: CAPEC

RASEN - 316853 7

Attribute Description Name (CAPEC-34, HTTP Response Splitting) Typical likelihood of

exploit Medium

Attack motivation-

consequences (Execute unauthorized code or commands, {Confidentiality,

Integrity, Availability}),

(Gain privileges / assume identify, {Confidentiality})

CIA impact (High, High, Low) CWE ID (Related

weaknesses) CWE-113 Improper Neutralization of CRLF Sequences in HTTP

Headers ('HTTP Response Splitting'),

CWE-697 Insufficient Comparison,

CWE-707 Improper Enforcement of Message or Data

Structure,

CWE-713 OWASP Top Ten 2007 Category A2 - Injection Flaws

Page 8: USING CAPEC FOR RISK-BASED SECURITY TESTING

Step I: CAPEC to generic risk model

RASEN - 316853 8

Name

Typical likelihood of exploit

CWE ID (Related

weaknesses) Attack motivation consequences

CIA impact

Page 9: USING CAPEC FOR RISK-BASED SECURITY TESTING

Step II: Refine generic CORAS risk model

RASEN - 316853 9

CAPEC-62

CAPEC-34

Page 10: USING CAPEC FOR RISK-BASED SECURITY TESTING

Step II: Refine generic CORAS risk model (cont.)

RASEN - 316853 10

Page 11: USING CAPEC FOR RISK-BASED SECURITY TESTING

Step III: Test procedure identification

RASEN - 316853 11

Page 12: USING CAPEC FOR RISK-BASED SECURITY TESTING

Step III: Test procedure selection and prioritization

RASEN - 316853 12

Page 13: USING CAPEC FOR RISK-BASED SECURITY TESTING

Test procedure selection and prioritization

RASEN - 316853 13

Test procedure Sensitivity Effort

Check that Cross Site Request Forgery (aka Session Riding) leads

to Cross Site Request Forgery (aka Session Riding) successful with

conditional likelihood [0.001, 0.1], due to vulnerabilities OWASP

Top Ten 2007 Category A5 - Cross Site Request Forgery (CSRF),

Incorrect Permission Assignment for Critical Resource, Cross-Site

Request Forgery (CSRF) and Improper Control of a Resource

Through its Lifetime.

9.815030935488

287E-4

1 day

Check that HTTP Response Splitting leads to HTTP Response

Splitting successful with conditional likelihood [1.0E-4, 0.001],

due to vulnerabilities Insufficient Comparison, Improper

Neutralization of CRLF Sequences in HTTP Headers ('HTTP

Response Splitting'), Improper Enforcement of Message or Data

Structure and OWASP Top Ten 2007 Category A2 - Injection

Flaws.

1.447474243798

8263E-7

1 day

Page 14: USING CAPEC FOR RISK-BASED SECURITY TESTING

Conclusions

� We have presented a method and a technique for risk-based testing based on CAPEC

� We believe that the method supports criteria C1 – C3 � C1 is supported by our technique for risk model generation

which reduces the time of constructing a risk model compared to a manual process.

� C2 is supported since the generated risk model is suitable for test procedure identification.

� C3 is supported since our method provides a sound basis for test-procedure prioritization based on risk model information. This enables the testing to be focused on the attacks and/or vulnerabilities that are most relevant for obtaining an accurate and correct risk model.

RASEN - 316853 14