Towards automated verification of active cyber defense strategies on software defined networks

Mohammed Noraden Alsaleh, Ehab Al-Shaer

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Active Cyber Defense (ACD) reconfigures cyber systems (networks and hosts) in timely manner in order to automatically respond to cyber incidents and mitigate potential risks or attacks. However, to launch a successful cyber defense, ACD strategies need to be proven effective in neutralizing the threats and enforceable under the current state and capabilities of the network. In this paper, we present a bounded model checking framework based on SMT to verify that the network can support the given ACD strategies accurately and safely without jeopardizing cyber mission invariants. We abstract the ACD strategies as sets of serializable reconfigurations and provide user interfaces to define cyber mission invariants as reachability, security, and QoS properties. We then verify the satisfaction of these invariants under the given strategies. We implemented this system on OpenFlow-based Software Defined Networks and we evaluated the time complexity for verifying ACD strategies on OpenFlow networks of over two thousand nodes and thousands of rules.

Original languageEnglish
Title of host publicationSafeConfig 2016 - Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, co-located with CCS 2016
PublisherAssociation for Computing Machinery, Inc
Pages23-29
Number of pages7
ISBN (Electronic)9781450345668
DOIs
StatePublished - 24 Oct 2016
Externally publishedYes
Event9th ACM Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig 2016 - Vienna, Austria
Duration: 24 Oct 2016 → …

Publication series

NameSafeConfig 2016 - Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, co-located with CCS 2016

Conference

Conference9th ACM Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig 2016
Country/TerritoryAustria
CityVienna
Period24/10/16 → …

Bibliographical note

Publisher Copyright:
© 2016 ACM.

Keywords

  • Active cyber defense
  • Bounded model checking
  • Configuration
  • OpenFlow
  • Software defined networks
  • Verification

ASJC Scopus subject areas

  • Computer Science Applications
  • Artificial Intelligence
  • Computational Theory and Mathematics

Fingerprint

Dive into the research topics of 'Towards automated verification of active cyber defense strategies on software defined networks'. Together they form a unique fingerprint.

Cite this