论文标题

评估分布式系统中隐性相互作用的可剥削性

Evaluating the Exploitability of Implicit Interactions in Distributed Systems

论文作者

Jaskolka, Jason

论文摘要

隐性交互是指系统设计人员可能是意外和/或无法预料的系统组件之间的相互作用。因此,它们代表了网络安全漏洞,可以利用这些漏洞来安装网络攻击,从而导致严重稳定的系统效应。在本文中,我们研究了使用代数建模框架指定的分布式系统中的隐式相互作用,称为交流并发kleene代数(c $^2 $ ka)。为了识别和防御一系列可能的攻击方案,我们开发了一种新的可利用性量度,以帮助评估系统设计中这种漏洞启动网络攻击所带来的威胁。提出的方法基于对系统代理的影响和响应及其C $^2 $ KA规格的建模和分析。我们还使用支持自动分析的原型工具来证明所提出的方法的适用性。此处介绍的严格,实用的技术使分布式系统设计中的网络安全脆弱性更容易识别,评估然后进行缓解,从而为整体系统的弹性,可靠性和安全性提供了重大改进。

Implicit interactions refer to those interactions among the components of a system that may be unintended and/or unforeseen by the system designers. As such, they represent cybersecurity vulnerabilities that can be exploited to mount cyber-attacks causing serious and destabilizing system effects. In this paper, we study implicit interactions in distributed systems specified using the algebraic modeling framework known as Communicating Concurrent Kleene Algebra (C$^2$KA). To identify and defend against a range of possible attack scenarios, we develop a new measure of exploitability for implicit interactions to aid in evaluating the threat posed by the existence of such vulnerabilities in system designs for launching cyber-attacks. The presented approach is based on the modeling and analysis of the influence and response of the system agents and their C$^2$KA specifications. We also demonstrate the applicability of the proposed approach using a prototype tool that supports the automated analysis. The rigorous, practical techniques presented here enable cybersecurity vulnerabilities in the designs of distributed systems to be more easily identified, assessed, and then mitigated, offering significant improvements to overall system resilience, dependability, and security.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源