Title :
Application stress testing Achieving cyber security by testing cyber attacks
Author :
Underbrink, A. ; Potter, Andrew ; Jaenisch, H. ; Reifer, D.J.
Author_Institution :
Sentar, Inc., Huntsville, AL, USA
Abstract :
Application stress testing applies the concept of computer network penetration testing to software applications. Since software applications may be attacked - from inside or outside a protected network boundary - they are threatened by actions and conditions which cause delays, disruptions, or failures. Stress testing exposes software systems to simulated cyber attacks, revealing potential weaknesses and vulnerabilities in their implementation. By using such testing, these internal weaknesses and vulnerabilities can be discovered earlier in the software development life cycle, corrected prior to deployment, and lead to improved software quality. Application stress testing is a process and software prototype for verifying the quality of software applications under severe operating conditions. Since stress testing is rarely - if at all - performed today, the possibility of deploying critical software systems that have been stress tested provides a much stronger indication of their ability to withstand cyber attacks. Many possible attack vectors against critical software can be verified as true threats and mitigated prior to deployment. This improves software quality and serves as a tremendous risk reduction for critical software systems used in government and commercial enterprises. The software prototype models and verifies failure conditions of a system under test (SUT). The SUT is first executed in a virtual environment and its normal operational modes are observed. A normal behavior model is generated in order to predict failure conditions based on attack models and external SUT interfaces. Using off-the-shelf software tools, the predictions are verified in the virtual environment by stressing the executing SUT with attacks against the SUT. Results are presented to testers and system developers for dispensation or mitigation.
Keywords :
computer network security; program testing; program verification; risk analysis; safety-critical software; software prototyping; software quality; software tools; virtual reality; SUT; application stress testing; commercial enterprises; computer network penetration testing; critical software system; cyber attack testing; cyber security; delay; failure analysis; formal verification; government enterprises; off-the-shelf software tools; potential weaknesses revealing; protected network boundary; risk reduction; software application; software development life cycle; software prototype model; software quality; software systems; software vulnerability; system under test; virtual environment; Databases; Monitoring; Prototypes; Software systems; Stress; Testing; application testing; attack; penetration testing; softwaer quality; software assurance;
Conference_Titel :
Homeland Security (HST), 2012 IEEE Conference on Technologies for
Conference_Location :
Waltham, MA
Print_ISBN :
978-1-4673-2708-4
DOI :
10.1109/THS.2012.6459909