Verifying the enforcement and effectiveness of network lateral movement resistance techniques

Mohammed Noraden Alsaleh, Ehab Al-Shaer, Qi Duan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

As the sophistication of cyber-attacks is ever increasing, cyber breaches become inevitable and their consequences are often highly damaging. Isolation and diversity are key techniques of cyber resilience for creating built-in resistance in cyber networks against the lateral movement of multi-step Advanced Persistent Threats (APTs) and epidemic attacks. However, the key unaddressed challenges are (1) how to ensure that specific isolation and diversity configurations are sufficient to prevent the lateral movement of attacks and (2) how to verify that such configurations are enforced safely despite the complex inter-dependency between cyber components. In this paper, we address these challenges by developing formal models and properties to verify the effectiveness and enforceability of proactive cyber resistance techniques. We present a bounded model checking approach based on satisfiability Modulo theories (SMT) for OpenFlow software defined networks (SDNs). We verify that given resistance techniques are enforced in a way that does not violate the cyber mission requirements and we evaluate the configuration resistance based on user-defined resistance properties.

Original languageEnglish
Title of host publicationSECRYPT
EditorsPierangela Samarati, Mohammad S. Obaidat, Mohammad S. Obaidat
PublisherSciTePress
Pages246-257
Number of pages12
ISBN (Electronic)9789897583193
DOIs
StatePublished - 2018
Externally publishedYes
Event15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Porto, Portugal
Duration: 26 Jul 201828 Jul 2018

Publication series

NameICETE 2018 - Proceedings of the 15th International Joint Conference on e-Business and Telecommunications
Volume2

Conference

Conference15th International Joint Conference on e-Business and Telecommunications, ICETE 2018
Country/TerritoryPortugal
CityPorto
Period26/07/1828/07/18

Bibliographical note

Publisher Copyright:
Copyright © 2018 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved

Keywords

  • Configuration
  • Cyber Attacks
  • Model Checking
  • Resilience
  • Resistance

ASJC Scopus subject areas

  • Signal Processing
  • Electrical and Electronic Engineering
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Verifying the enforcement and effectiveness of network lateral movement resistance techniques'. Together they form a unique fingerprint.

Cite this