Cyber resilience-by-construction: Modeling, measuring & verifying

Yasir Imtiaz Khan, Ehab Al-Shaer, Usman Rauf

    Research output: Chapter in Book/Report/Conference proceedingConference proceedingpeer-review

    5 Citations (Scopus)


    The need of cyber security is increasing as cyber attacks are escalating day by day. Cyber attacks are now so many and sophisticated that many will unavoidably get through. Therefore, there is an immense need to employ resilient architectures to defend known or unknown threats. Engineering resilient system/infrastructure is a challenging task, that implies how to measure the resilience and how to obtain sufficient resilience necessary to maintain its service delivery under diverse situations. This paper has two fold objective, the first is to propose a formal approach to measure cyber resilience from different aspects (i.e., attacks, failures) and at different levels (i.e., pro-active, resistive and reactive). To achieve the first objective, we propose a formal framework named as: Cyber Resilience Engineering Framework (CREF). The second objective is to build a resilient system by construction. The idea is to build a formal model of a cyber system, which is initially not resilient with respect to attacks. Then by systematic refinements of the formal model and by its model checking, we attain resiliency. We exemplify our technique through the case study of simple cyber security device (i.e., network firewall).
    Original languageEnglish
    Title of host publicationSafeConfig 2015 - Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense
    PublisherAssociation for Computing Machinery (ACM)
    Number of pages6
    ISBN (Print)978-1-4503-3821-9
    Publication statusPublished - 12 Oct 2015
    EventSafeConfig'15 - Workshop on Automated Decision Making for Active Cyber Defense - Denver, United States
    Duration: 12 Oct 201512 Oct 2015


    WorkshopSafeConfig'15 - Workshop on Automated Decision Making for Active Cyber Defense
    Abbreviated titleSafeConfig'15
    Country/TerritoryUnited States
    Internet address


    • Algebraic petri nets
    • Cyber resilience
    • Firewall
    • Model checking


    Dive into the research topics of 'Cyber resilience-by-construction: Modeling, measuring & verifying'. Together they form a unique fingerprint.

    Cite this