Re: On classifying attacks
From: Crispin Cowan (crispin_at_novell.com)
Date: Thu, 28 Jul 2005 01:33:46 -0700 To: "Black, Michael" <black@EssexCorp.com>
Black, Michael wrote:
> Perhaps the current popularity of remote/local terms comes from the
> Lincoln Labs studies done in 1998:
> Attacks were divided into four categories:
> denial of service
> remote to local
> user to root attacks
I participated in that Lincoln Labs study, and my recollection is that
the remote/local distinction was already popular on bugtraq at the time.
The LL study was an attempt to simulate a natural threat.
> In the email examples given so far (note that nothing of similarity was
> in the LL study) they would all be "remote to local".
Well, no. There is also direct "remote to root", which is a significant
classification that is distinct from "remote to local" and "local to
root". It is what you get if you have an exploit against root privileged
daemons (BIND, ntpd, etc.) and what you get if you have an exploit
against Microsoft Outlook being run as Administrator.
> There's no need for trying to define a compound attack -- it serves no
How is that? Classification schemes work best when you break things down
to their component atoms so that you can build up letters into words and
words into sentences. Those pesky attackers insist on using blended
attacks, and if we want to discuss what attackers do, we will either
need to define compound attacks, or else come up with a *very* large
-- Crispin Cowan, Ph.D. http://crispincowan.com/~crispin/ Director of Software Engineering, Novell http://novell.com