Security configuration analytics using video games

Mohammed Noraden Alsaleh, Ehab Alsaleh Al-Shaer

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Computing systems today have a large number of security configuration settings that enforce security properties. However, vulnerabilities and incorrect configuration increase the potential for attacks. Provable verification and simulation tools have been introduced to eliminate configuration conflicts and weaknesses, which can increase system robustness against attacks. Most of these tools require special knowledge in formal methods and precise specification for requirements in special languages, in addition to their excessive need for computing resources. Video games have been utilized by researchers to make educational software more attractive and engaging. Publishing these games for crowdsourcing can also stimulate competition between players and increase the game educational value. In this paper we introduce a game interface, called NetMaze, that represents the network configuration verification problem as a video game and allows for attack analysis. We aim to make the security analysis and hardening usable and accurately achievable, using the power of video games and the wisdom of crowdsourcing. Players can easily discover weaknesses in network configuration and investigate new attack scenarios. In addition, the gameplay scenarios can also be used to analyze and learn attack attribution considering human factors. In this paper, we present a provable mapping from the network configuration to 3D game objects.

Original languageEnglish
Title of host publication2014 IEEE Conference on Communications and Network Security, CNS 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages256-264
Number of pages9
ISBN (Electronic)9781479958900
DOIs
StatePublished - 23 Dec 2014
Externally publishedYes
Event2014 IEEE Conference on Communications and Network Security, CNS 2014 - San Francisco, United States
Duration: 29 Oct 201431 Oct 2014

Publication series

Name2014 IEEE Conference on Communications and Network Security, CNS 2014

Conference

Conference2014 IEEE Conference on Communications and Network Security, CNS 2014
Country/TerritoryUnited States
CitySan Francisco
Period29/10/1431/10/14

Bibliographical note

Publisher Copyright:
© 2014 IEEE.

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Security configuration analytics using video games'. Together they form a unique fingerprint.

Cite this