Abstract
Active Cyber Defense (ACD) reconfigures cyber systems (networks and hosts) in timely manner in order to automatically respond to cyber incidents and mitigate potential risks or attacks. However, to launch a successful cyber defense, ACD strategies need to be proven effective in neutralizing the threats and enforceable under the current state and capabilities of the network. In this paper, we present a bounded model checking framework based on SMT to verify that the network can support the given ACD strategies accurately and safely without jeopardizing cyber mission invariants. We abstract the ACD strategies as sets of serializable reconfigurations and provide user interfaces to define cyber mission invariants as reachability, security, and QoS properties. We then verify the satisfaction of these invariants under the given strategies. We implemented this system on OpenFlow-based Software Defined Networks and we evaluated the time complexity for verifying ACD strategies on OpenFlow networks of over two thousand nodes and thousands of rules.
| Original language | English |
|---|---|
| Title of host publication | SafeConfig 2016 - Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, co-located with CCS 2016 |
| Publisher | Association for Computing Machinery, Inc |
| Pages | 23-29 |
| Number of pages | 7 |
| ISBN (Electronic) | 9781450345668 |
| DOIs | |
| State | Published - 24 Oct 2016 |
| Externally published | Yes |
| Event | 9th ACM Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig 2016 - Vienna, Austria Duration: 24 Oct 2016 → … |
Publication series
| Name | SafeConfig 2016 - Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, co-located with CCS 2016 |
|---|
Conference
| Conference | 9th ACM Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig 2016 |
|---|---|
| Country/Territory | Austria |
| City | Vienna |
| Period | 24/10/16 → … |
Bibliographical note
Publisher Copyright:© 2016 ACM.
Keywords
- Active cyber defense
- Bounded model checking
- Configuration
- OpenFlow
- Software defined networks
- Verification
ASJC Scopus subject areas
- Computer Science Applications
- Artificial Intelligence
- Computational Theory and Mathematics