Visible to the public Multi-model run-time security analysis - January 2017Conflict Detection Enabled

Public Audience
Purpose: To highlight progress. Information is generally at a higher level which is accessible to the interested public.

PI(s): David Garlan, Bradley Schmerl

1) HARD PROBLEM(S) ADDRESSED (with short descriptions)

  • Composability through multiple semantic models (here, architectural, organizational, and behavioral), which provide separation of concerns, while supporting synergistic benefits through integrated analyses.
  • Scalability to large complex distributed systems using architectural models.
  • Resilient architectures through the use of adaptive models that can be used at run-time to predict, detect and repair security attacks.
  • Predictive security metrics by adapting social network-based metrics to the problem of architecture-level anomaly detection.

2) PUBLICATIONS

  • Hemank Lamba, Bryan Hooi, Kijung Shin, and Christos Faloutsos. zooRay: Scoring Entities in Anomalous Temporal Multimodal Blocks.

- Submitted to the Pacific-Asia Conference on Knowledge Discovery and Data Mining, 2017.

  • Hemank Lamba, Thomas J. Glazier, Javier Camara, Bradley Schmerl, David Garlan and Jurgen Pfeffer. Model-based cluster analysis for identifying suspicious activity sequences in software. 2017. Submitted for publication to the 3rd International Workshop on Security and Privacy Analytics - 2017.

3) KEY HIGHLIGHTS

We started a new task on resilience - using models of software, attacks, and defenses to provide analyzable and automated self-adaptive defense.

4) COMMUNITY ENGAGEMENTS

We have engaged with a new group from the NSA to start the new subtask above.

5) EDUCATIONAL ADVANCES