DocumentCode :
2301558
Title :
Model-Based Cyber Security
Author :
Rasche, Galen ; Allwein, Erin ; Moore, Michael ; Abbott, Ben
Author_Institution :
Southwest Res. Inst., San Antonio, TX
fYear :
2007
fDate :
26-29 March 2007
Firstpage :
405
Lastpage :
412
Abstract :
This paper presents an approach for automatically verifying the correctness of cyber security applications through formal analysis guided by hierarchical models of the network, its applications, and potential attacks. This work is motivated by the need for a more intuitive, automated systems-level approach to determining the overall security characteristics of a large network. Given the complex nature of security tools and their general lack of interoperability, it is difficult for system designers to make definitive statements about the nature of their network defense. Our work focuses on creating an environment in which security experts can model the security aspects of complex networks using a graphical notation that is intuitive and natural for them, then automatically perform security activities such as formally verifying the safety of the network against known threats and exploring the network design for potential vulnerabilities. The environment is designed to utilize third party tools for performing these activities and concentrates on integration of these tools within a common modeling framework
Keywords :
formal verification; open systems; security of data; cyber security; formal verification; interoperability; security tools; Complex networks; Computer networks; Computer security; Information security; Information systems; Performance analysis; Power system security; Protection; Safety; Unified modeling language;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Engineering of Computer-Based Systems, 2007. ECBS '07. 14th Annual IEEE International Conference and Workshops on the
Conference_Location :
Tucson, AZ
Print_ISBN :
0-7695-2772-8
Type :
conf
DOI :
10.1109/ECBS.2007.50
Filename :
4148957
Link To Document :
بازگشت