首页> 外文会议>IEEE Conference on Communications and Network Security >Automated synthesis of resiliency configurations for cyber networks
【24h】

Automated synthesis of resiliency configurations for cyber networks

机译:自动综合网络的弹性配置

获取原文

摘要

Enterprise networks deploy security devices to control access and limit potential threats. Due to the emergence of zero-day attacks, security device based isolation measures like access denial, trusted communication, and payload inspection are often not adequate for the resilient execution of an organization's mission. Diversity between two hosts in terms of operating systems and services running on these hosts is crucial for limiting the attack propagation. Since different software systems have different vulnerabilities, it is important to have the hosts diversified considering the isolation among the hosts as well as the mission requirements. In this paper, we present a formal model for synthesizing network resiliency configurations. The resiliency design integrates isolation and diversity measures. We take the network topology, resiliency requirements, and business constraints as inputs. Then, our proposed model synthesizes cost-effective resiliency configurations satisfying the constraints. The output of the model provides necessary placements of different security devices in the topology and necessary installments of operating systems and services on the hosts. We demonstrate the execution of the proposed model as well as their scalability using simulated experiments.
机译:企业网络部署安全设备以控制访问并限制潜在威胁。由于零日攻击的出现,基于安全设备的隔离措施(例如访问拒绝,可信通信和有效负载检查)通常不足以弹性执行组织的任务。就限制这些主机上运行的操作系统和服务而言,两台主机之间的多样性至关重要。由于不同的软件系统具有不同的漏洞,因此考虑到主机之间的隔离性和任务要求,使主机多样化是很重要的。在本文中,我们提出了用于综合网络弹性配置的正式模型。弹性设计集成了隔离和多样性措施。我们将网络拓扑,弹性需求和业务约束作为输入。然后,我们提出的模型综合了满足约束条件的具有成本效益的弹性配置。该模型的输出提供了拓扑中不同安全设备的必要位置,以及主机上操作系统和服务的必要位置。我们使用模拟实验演示了所提出模型的执行及其可伸缩性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号