DocumentCode :
1782750
Title :
Security configuration analytics using video games
Author :
Alsaleh, Mohammed Noraden ; Al-Shaer, Ehab Alsaleh
Author_Institution :
Univ. of North Carolina at Charlotte, Charlotte, NC, USA
fYear :
2014
fDate :
29-31 Oct. 2014
Firstpage :
256
Lastpage :
264
Abstract :
Computing systems today have a large number of security configuration settings that enforce security properties. However, vulnerabilities and incorrect configuration increase the potential for attacks. Provable verification and simulation tools have been introduced to eliminate configuration conflicts and weaknesses, which can increase system robustness against attacks. Most of these tools require special knowledge in formal methods and precise specification for requirements in special languages, in addition to their excessive need for computing resources. Video games have been utilized by researchers to make educational software more attractive and engaging. Publishing these games for crowdsourcing can also stimulate competition between players and increase the game educational value. In this paper we introduce a game interface, called NetMaze, that represents the network configuration verification problem as a video game and allows for attack analysis. We aim to make the security analysis and hardening usable and accurately achievable, using the power of video games and the wisdom of crowdsourcing. Players can easily discover weaknesses in network configuration and investigate new attack scenarios. In addition, the gameplay scenarios can also be used to analyze and learn attack attribution considering human factors. In this paper, we present a provable mapping from the network configuration to 3D game objects.
Keywords :
computer games; courseware; formal verification; human factors; security of data; specification languages; user interfaces; 3D game object; NetMaze; attack analysis; attack attribution; computing systems; configuration conflict; crowdsourcing; educational software; formal methods; game educational value; game interface; gameplay scenario; human factor; network configuration verification problem; provable mapping; provable verification; security analysis; security configuration analytics; security configuration settings; security property; simulation tool; special languages; system robustness; video games; vulnerability; Communication networks; Computational modeling; Conferences; Games; Network topology; Security; Topology;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications and Network Security (CNS), 2014 IEEE Conference on
Conference_Location :
San Francisco, CA
Type :
conf
DOI :
10.1109/CNS.2014.6997493
Filename :
6997493
Link To Document :
بازگشت