Visible to the public Multi-model run-time security analysis - July 2015Conflict Detection Enabled

Public Audience
Purpose: To highlight progress. Information is generally at a higher level which is accessible to the interested public.

PI(s): Jurgen Pfeffer
Co-PI(s): David Garlan, Bradley Schmerl

1) HARD PROBLEM(S) ADDRESSED (with short descriptions)

  • Composability through multiple semantic models (here, architectural, organizational, and behavioral), which provide separation of concerns, while supporting synergistic benefits through integrated analyses.
  • Scalability to large complex distributed systems using architectural models.
  • Resilient architectures through the use of adaptive models that can be used at run-time to predict, detect and repair security attacks.
  • Predictive security metrics by adapting social network-based metrics to the problem of architecture-level anomaly detection.

2) PUBLICATIONS

Hemank Lamba, Thomas J. Glazier, Bradley Schmerl, Jurgen Pfeffer, David Garlan (2015). Detecting Insider Threats in Software Systems using Graph Models of Behavioral Paths (short paper). HotSoS 2015: 2015 Symposium and Bootcamp on the Science of Security, April 21-22, Urbana-Champaign, IL.

3) KEY HIGHLIGHTS

  • This quarter, the focus of our work was on data.

  • We gathered a set of candidate datasets that could qualify for our insider thread scenario.

  • We extended our simulator for insider thread scenarios.

  • We participated at the poster session of the quarterly lablet meeting at CMU.

  • Long conference paper is ready for submission.