Cyber resilience-by-construction: Modeling, measuring & verifying

Yasir Imtiaz Khan, Ehab Al-Shaer, Usman Rauf

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

3 Citations (Scopus)

Abstract

The need of cyber security is increasing as cyber attacks are escalating day by day. Cyber attacks are now so many and sophisticated that many will unavoidably get through. Therefore, there is an immense need to employ resilient architectures to defend known or unknown threats. Engineering resilient system/infrastructure is a challenging task, that implies how to measure the resilience and how to obtain sufficient resilience necessary to maintain its service delivery under diverse situations. This paper has two fold objective, the first is to propose a formal approach to measure cyber resilience from different aspects (i.e., attacks, failures) and at different levels (i.e., pro-active, resistive and reactive). To achieve the first objective, we propose a formal framework named as: Cyber Resilience Engineering Framework (CREF). The second objective is to build a resilient system by construction. The idea is to build a formal model of a cyber system, which is initially not resilient with respect to attacks. Then by systematic refinements of the formal model and by its model checking, we attain resiliency. We exemplify our technique through the case study of simple cyber security device (i.e., network firewall).
Original languageEnglish
Title of host publicationSafeConfig 2015 - Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense
PublisherAssociation for Computing Machinery (ACM)
Pages9-14
Number of pages6
ISBN (Print)978-1-4503-3821-9
DOIs
Publication statusPublished - 12 Oct 2015
EventSafeConfig'15 - Workshop on Automated Decision Making for Active Cyber Defense - Denver, United States
Duration: 12 Oct 201512 Oct 2015
https://www.sigsac.org/ccs/CCS2015/safeconfig2015-toc.html

Workshop

WorkshopSafeConfig'15 - Workshop on Automated Decision Making for Active Cyber Defense
Abbreviated titleSafeConfig'15
CountryUnited States
CityDenver
Period12/10/1512/10/15
Internet address

Keywords

  • Algebraic petri nets
  • Cyber resilience
  • Firewall
  • Model checking

Fingerprint Dive into the research topics of 'Cyber resilience-by-construction: Modeling, measuring & verifying'. Together they form a unique fingerprint.

  • Cite this

    Khan, Y. I., Al-Shaer, E., & Rauf, U. (2015). Cyber resilience-by-construction: Modeling, measuring & verifying. In SafeConfig 2015 - Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense (pp. 9-14). Association for Computing Machinery (ACM). https://doi.org/10.1145/2809826.2809836