Modeling Insecurity : Enabling Recovery - Oriented Security with Dynamic Policies

نویسندگان

  • PRASAD G. NALDURG
  • John Lilly
چکیده

Policy engineering for access-control security has traditionally focused on specification and verification of safety properties (“nothing bad happens”). In most real systems however, resources and access mechanisms are regularly compromised, either maliciously by attackers, or inadvertently due to vulnerabilities caused by poor systems-engineering. I argue that the all-or-nothing nature of assurance provided by safety-engineering cannot describe or reason about systems that are secure and survivable—systems that can be engineered to proactively or reactively change their security policies and policy enforcement mechanisms, and thereby continue to provide assurance for critical resources, in spite of compromises and failures. In this thesis, I present a framework that extends traditional state-transition models of access control security, to describe timing guarantees and stochastic behavior, and show how we can introduce notions of information compromise, subsequent recovery (whenever possible) and flexibleresponse in a modular fashion. Our framework is also capable of describing insider attacks. I show how we need to focus on liveness properties (“something good eventually happens”) to explicitly capture the temporal and dynamic nature of enforceable guarantees required for survivability. I develop a new class of properties expressed as branching-time temporal logic formulas that focus on secure availability as a measure of survivability. For finite-state models, the validation of these formulas is decidable in polynomial time using automated model-checking techniques. To showcase the expressive power of our framework, I apply it to study network Denial of Service (DoS) attacks, and model resilience to such attacks as a survivability property. I show how we can systematically analyze the relative impact of different anti-DoS strategies by changing policies and mechanisms during an attack. Using our automated verification methodology, we formally prove for the first time whether strategies such as selective filtering, strong-authentication, and client-puzzles reduce the vulnerability of an example network to DoS attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Association between Social Welfare, Food Security and Diet Diversity among Afghan Immigrant Households in the Southern Areas of Tehran Province

Background and Objectives: Due to the importance of ameliorating the food security status of immigrants, as one of the main vulnerable groups at the international level, in the present study, the association between food security, diet diversity, socio-economic factors, and social welfare of Afghan immigrant households in the Southern areas of Tehran Province was investigated.  Materials & Me...

متن کامل

Towards the Aggregation of Security Requirements in Cross-Organisational Service Compositions

The seamless composition of independent services is one of the success factors of Service-oriented Architectures (SOA). Services are orchestrated to service compositions across organisational boundaries to enable a faster reaction to changing business needs. Each orchestrated service might demand the provision of specific user information and requires particular security mechanisms. To enable a...

متن کامل

Security, insecurity and health.

An examination of the nexus of security, insecurity and health shows that security is a prerequisite for health. The many and varied ways that armed violence--including threats of armed violence--can affect people's health can be documented by formal studies; however, valuable data also exist in other reports, such as media reports. The health community needs to recognize that people's insecuri...

متن کامل

Game-Theoretic Analyses and Simulations of Adoptions of Security Policies for Drm in Contents Sharing Scenario

A legitimate contents sharing is an essential functionality of DRM (Digital Rights Management)-enabling contents industry and its value chain extension. In order to effectively choose and deploy some typical security policies in a contents sharing scenario, we introduced game theory to analysis the mutual influence of adoptions of trusted computing enabling enhanced security policies on benefit...

متن کامل

Food Security: An Ecological–Social Analysis to Promote Social Development

Coupled with the obesity epidemic, food insecurity presents a public health and social crisis. The United States’ industrialized food system embodies an unsustainable network of production and unequal distribution of food creating threats to both the natural environment and human development. Ecological, economic, and social systems are interdependent and their relationships to food security ar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004