CLIPS/ActiveSDN for automated and safe cybersecurity course-of-actions orchestration

Md Mazharul Islam, Ehab Al-Shaer, Ashutosh Dutta, Mohammed Noraden Alsaleh

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Continuous attack reports such as data breach, malware, phishing and spamming attack published daily indicate that cyber attack is inevitable in our daily life. Sometimes it takes days, even month to detect and mitigate such stealthy attacks. These require to make network systems resilient against attacks with a high assurance of defense mechanisms that can go beyond attack detection with safe mitigation. That's why we developed a flexible yet expressive policy specification language called CLIPS for Active Cyber Defence, and provably-correct policy refinement engine, ActiveSDN to enable a safe, efficient construction and execution of Course-of-Action workflow composed of investigating for analysis and mitigating for reconfiguration actions to support cyber resilience automation.

Original languageEnglish
Title of host publicationProceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019
PublisherAssociation for Computing Machinery
ISBN (Electronic)9781450371476
DOIs
StatePublished - 1 Apr 2019
Externally publishedYes
Event6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019 - Nashville, United States
Duration: 1 Apr 20193 Apr 2019

Publication series

NameACM International Conference Proceeding Series

Conference

Conference6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019
Country/TerritoryUnited States
CityNashville
Period1/04/193/04/19

Bibliographical note

Publisher Copyright:
© 2019 Copyright held by the owner/author(s).

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'CLIPS/ActiveSDN for automated and safe cybersecurity course-of-actions orchestration'. Together they form a unique fingerprint.

Cite this