Verifying the Enforcement and Effectiveness of Network Lateral Movement Resistance Techniques
Mohammed Noraden Alsaleh, Ehab Al-Shaer, Qi Duan
2018
Abstract
As the sophistication of cyber-attacks is ever increasing, cyber breaches become inevitable and their consequences are often highly damaging. Isolation and diversity are key techniques of cyber resilience for creating built-in resistance in cyber networks against the lateral movement of multi-step Advanced Persistent Threats (APTs) and epidemic attacks. However, the key unaddressed challenges are (1) how to ensure that specific isolation and diversity configurations are sufficient to prevent the lateral movement of attacks and (2) how to verify that such configurations are enforced safely despite the complex inter-dependency between cyber components. In this paper, we address these challenges by developing formal models and properties to verify the effectiveness and enforceability of proactive cyber resistance techniques. We present a bounded model checking approach based on satisfiability Modulo theories (SMT) for OpenFlow software defined networks (SDNs). We verify that given resistance techniques are enforced in a way that does not violate the cyber mission requirements and we evaluate the configuration resistance based on user-defined resistance properties.
DownloadPaper Citation
in Harvard Style
Alsaleh M., Al-Shaer E. and Duan Q. (2018). Verifying the Enforcement and Effectiveness of Network Lateral Movement Resistance Techniques.In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT, ISBN 978-989-758-319-3, pages 246-257. DOI: 10.5220/0006868902460257
in Bibtex Style
@conference{secrypt18,
author={Mohammed Noraden Alsaleh and Ehab Al-Shaer and Qi Duan},
title={Verifying the Enforcement and Effectiveness of Network Lateral Movement Resistance Techniques},
booktitle={Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT,},
year={2018},
pages={246-257},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006868902460257},
isbn={978-989-758-319-3},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT,
TI - Verifying the Enforcement and Effectiveness of Network Lateral Movement Resistance Techniques
SN - 978-989-758-319-3
AU - Alsaleh M.
AU - Al-Shaer E.
AU - Duan Q.
PY - 2018
SP - 246
EP - 257
DO - 10.5220/0006868902460257