REFERENCES
Al-Shaer, E. and Al-Haj, S. (2010). Flowchecker: Configu-
ration analysis and verification of federated openflow
infrastructures. In Proceedings of the 3rd ACM works-
hop on Assurable and usable security configuration,
pages 37–44. ACM.
Al-Shaer, E., Marrero, W., El-Atawy, A., and Elbadawi, K.
(2009). Network configuration in a box: Towards end-
to-end verification of network reachability and secu-
rity. In ICNP, pages 123–132.
Alsaleh, M. N. and Al-Shaer, E. (2016). Towards automated
verification of active cyber defense strategies on soft-
ware defined networks. In Proceedings of the 2016
ACM Workshop on Automated Decision Making for
Active Cyber Defense, SafeConfig ’16, pages 23–29,
New York, NY, USA. ACM.
Bjorner, N. and Jayaraman, K. (2014). Network ve-
rification: Calculus and solvers. In Science and
Technology Conference (Modern Networking Techno-
logies)(MoNeTeC), 2014 International, pages 1–4.
IEEE.
Clarke, E., Biere, A., Raimi, R., and Zhu, Y. (2001). Boun-
ded model checking using satisfiability solving. For-
mal Methods in System Design, 19(1):7–34.
Goldman, H. (2010). Building secure, resilient architectures
for cyber mission assurance. The MITRE Corporation.
Goldman, H., McQuaid, R., and Picciotto, J. (2011). Cyber
resilience for mission assurance. In Technologies for
Homeland Security (HST), 2011 IEEE International
Conference on, pages 236–241. IEEE.
Hu, H., Han, W., Ahn, G.-J., and Zhao, Z. (2014). Flow-
guard: Building robust firewalls for software-defined
networks.
Kazemian, P., Chan, M., Zeng, H., Varghese, G., McKeown,
N., and Whyte, S. (2013). Real time network policy
checking using header space analysis. In NSDI, pages
99–111.
Kazemian, P., Varghese, G., and McKeown, N. (2012). He-
ader space analysis: Static checking for networks. In
NSDI, pages 113–126.
Khurshid, A., Zhou, W., Caesar, M., and Godfrey, P. (2012).
Veriflow: Verifying network-wide invariants in real
time. ACM SIGCOMM Computer Communication Re-
view, 42(4):467–472.
Larsen, P., Brunthaler, S., Davi, L., Sadeghi, A.-R., and
Franz, M. (2015). Automated software diversity. Synt-
hesis Lectures on Information Security, Privacy, &
Trust, 10(2):1–88.
Mai, H., Khurshid, A., Agarwal, R., Caesar, M., Godfrey, P.,
and King, S. T. (2011). Debugging the data plane with
anteater. ACM SIGCOMM Computer Communication
Review, 41(4):290–301.
Melin, A., Ferragut, E., Laska, J., Fugate, D., and Kisner, R.
(2013). A mathematical framework for the analysis of
cyber-resilient control systems. In Resilient Control
Systems (ISRCS), 2013 6th International Symposium
on, pages 13–18.
Miu, A., Balakrishnan, H., and Koksal, C. E. (2005). Impro-
ving loss resilience with multi-radio diversity in wi-
reless networks. In Proceedings of the 11th Annual
International Conference on Mobile Computing and
Networking, MobiCom ’05, pages 16–30, New York,
NY, USA. ACM.
Nicol, D. M. and Mallapura, V. (2014). Modeling and ana-
lysis of stepping stone attacks. In Proceedings of the
2014 Winter Simulation Conference, WSC ’14, pages
3036–3047, Piscataway, NJ, USA. IEEE Press.
ONF (2013). Openflow switch specifica-
tion, version 1.4.0 (wire protocol 0x05).
https://www.opennetworking.org/images/stories/
downloads/sdn-resources/onf-specifications/
openflow/openflow-spec-v1.4.0.pdf.
Qazi, Z. A., Tu, C.-C., Chiang, L., Miao, R., Sekar, V.,
and Yu, M. (2013). Simple-fying middlebox policy
enforcement using sdn. In ACM SIGCOMM Compu-
ter Communication Review, volume 43, pages 27–38.
ACM.
Qin, P., Dai, B., Huang, B., and Xu, G. (2014). Bandwidth-
aware scheduling with sdn in hadoop: A new trend for
big data. arXiv preprint arXiv:1403.2800.
Rahman, M. A. and Al-Shaer, E. (2013). A formal frame-
work for network security design synthesis. In Distri-
buted Computing Systems (ICDCS), 2013 IEEE 33rd
International Conference on, pages 560–570. IEEE.
Sahinoglu, M. (2006). Quantitative risk assessment for de-
pendent vulnerabilities. In Reliability and Maintai-
nability Symposium, 2006. RAMS ’06. Annual, pages
82–85.
Shullich, R., Chu, J., Ji, P., and Chen, W. (2011). A survey
of research in stepping-stone detection. International
Journal of Electronic Commerce Studies, 2(2):103–
126.
Son, S., Shin, S., Yegneswaran, V., Porras, P., and Gu, G.
(2013). Model checking invariant security properties
in openflow. In Communications (ICC), 2013 IEEE
International Conference on, pages 1974–1979.
Verizon (2016). 2016 data breach investigations report.
http://www.verizonenterprise.com/resources/reports/
rp
DBIR 2016 Report en xg.pdf.
Verizon (2017). 2017 data breach investigations report.
http://www.verizonenterprise.com/resources/reports/
rp DBIR 2017 Report en xg.pdf.
Yang, Y., Zhu, S., and Cao, G. (2008). Improving sensor
network immunity under worm attacks: A software
diversity approach. In Proceedings of the 9th ACM
International Symposium on Mobile Ad Hoc Networ-
king and Computing, MobiHoc ’08, pages 149–158,
New York, NY, USA. ACM.
Zeng, J. H. and Kazemian, P. Mini-Stanford Backbone).
https://reproducingnetworkresearch.wordpress.com/
2012/07/11/atpg/.
Zhang, M., Wang, L., Jajodia, S., Singhal, A., and Alba-
nese, M. (2016). Network diversity: a security me-
tric for evaluating the resilience of networks against
zero-day attacks. IEEE Transactions on Information
Forensics and Security, 11(5):1071–1086.
Verifying the Enforcement and Effectiveness of Network Lateral Movement Resistance Techniques
257