Visible to the public A Flexible Approach Towards Security Validation

TitleA Flexible Approach Towards Security Validation
Publication TypeConference Paper
Year of Publication2017
AuthorsAtighetchi, Michael, Yaman, Fusun, Last, David, Paltzer, Captain Nicholas, Caiazzo, Meghan, Raio, Stephen
Conference NameProceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5203-1
Keywordscomposability, experimentation, Metrics, Networked Control Systems Security, pubcrawl, resilience, Resiliency, security analysis, security control evaluation
AbstractValidating security properties of complex distributed systems is a challenging problem by itself, let alone when the work needs to be performed under tight budget and time constraints on prototype systems with components at various maturity levels. This paper described a tailored approach to security evaluations involving a strategic combination of model-based quantification, emulation, and logical argumentation. By customizing the evaluation to fit existing budget and timelines, validators can achieve the most appropriate validation process, trading off fidelity with coverage across a number of different defense components and different maturity levels. We successfully applied this process to the validation of an overlay proxy network, analyzing the impact of five different defense attributes (together with combinations thereof) on access path establishment and anonymity.
URLhttp://doi.acm.org/10.1145/3140368.3140370
DOI10.1145/3140368.3140370
Citation Keyatighetchi_flexible_2017