On the Completeness of Attack Mutation Algorithms

An attack mutation algorithm takes a known instance of an attack and transforms it into many distinct instances by repeatedly applying attack transformations. Such algorithms are widely used for testing intrusion detection systems. We investigate the notion of completeness of a mutation algorithm: its capability to generate all possible attack instances from a given set of attack transformations. We define the notion of a phi-complete mutation algorithm. Given a set of transformations , an algorithm is complete with respect to , if it can generate every instance that the transformations in derive. We show that if the rules in are uniform and reversible then a phi-complete algorithm exists. Intuitively speaking, uniform and reversible transformations mean that we can first exclusively apply transformations that simplify the attack, then exclusively apply transformations that complicate it, and still get all possible instances that are derived by the rules in . Although uniformity and reversibility may appear severe restrictions, we show that common attack transformations are indeed uniform and reversible. Therefore, our phi-complete algorithm can be incorporated into existing testing tools for intrusion detection systems. Furthermore, we show that a phi-complete algorithm is useful, not only for testing purposes, but also for determining whether two packet traces are two different mutations of the same attack.
Download:[PS,PDF]
Somesh Jha
Last modified: Fri Sep 22 16:54:42 CDT 2006