Multilayer Network Models for Coordinating Orchestration of Systems Security Engineering

被引:0
|
作者
Williams, Adam D. [1 ]
Birch, Gabriel C. [2 ]
Caskey, Susan A. [3 ]
Fleming, Elizabeth S. [4 ]
机构
[1] Sandia National Laboratories*, P.O. Box 5800, Albuquerque,NM,87185-1371, United States
[2] Sandia National Laboratories, P.O. Box 5800, Albuquerque,NM,87185-1006, United States
[3] Sandia National Laboratories, P.O. Box 5800, Albuquerque,NM,87185-1371, United States
[4] Sandia National Laboratories, P.O. Box 5800, Albuquerque,NM,87185-0152, United States
关键词
Complex networks;
D O I
10.1002/iis2.12949
中图分类号
学科分类号
摘要
Systems security engineering (SSE) faces new internal (e.g., increased digitization) and external (e.g., adversary capabilities) obstacles as systems increase in complexity and are deployed to increasingly challenging operating environments. Legacy approaches heavily rely on individual, physical, digital, or personnel domain-specific strategies for security. Such segmented responses helped initiate efforts by the INCOSE systems security working group to identify fundamental elements of SSE. One of these fundamental elements is security orchestration, where the SSE goal is to coordinate between previously disparate security solutions. Multilayer network-based approaches seemingly provide the logical structure and mathematical foundation to conduct security orchestration for tightly coupled coordinated system defense in cyber-relevant time. Within multilayer networks, the ability to identify and manipulate cross-domain (e.g., intralayer) connections that influence security performance measures demonstrates an enhanced level of security orchestration. As such, multilayer networks support the future of SSE efforts to mitigate real-world complexities, innovative adversaries, and disruptive technologies. After describing security orchestration as a concept and foundational element, this paper explores how multilayer network models can enhance orchestration systems security engineering. Additionally, a demonstration case of systems security for a high consequence facility (as a complex system) is followed insights and implications for incorporating orchestration in the future of systems security. Copyright © 2022 by Adam D. Williams, Gabriel C. Birch, Susan A. Caskey, and Elizabeth S. Fleming. Permission granted to INCOSE to publish and use.
引用
收藏
页码:565 / 578
相关论文
共 50 条
  • [21] Broadcasting protocols for coordinating nonlinear network systems
    Trip, Sebastian
    De Persis, Claudio
    Tesi, Pietro
    2018 EUROPEAN CONTROL CONFERENCE (ECC), 2018, : 2133 - 2138
  • [22] A Security Engineering Process for Systems of Systems using Security Patterns
    Ruiz, Jose Fran
    Rudolph, Carsten
    Mana, Antonio
    Arjona, Marcos
    2014 8TH ANNUAL IEEE SYSTEMS CONFERENCE (SYSCON), 2014, : 8 - 11
  • [23] Security systems engineering overview
    Steele, BJ
    SECURITY SYSTEMS AND NONLETHAL TECHNOLOGIES FOR LAW ENFORCEMENT, 1997, 2934 : 112 - 115
  • [24] Systems Engineering in a Cyber Security Engineering Program
    Brouse, Peggy
    INCOSE International Symposium, 2015, 25 (01) : 1403 - 1416
  • [25] Application of Multilayer Network Models in Bioinformatics
    Lv, Yuanyuan
    Huang, Shan
    Zhang, Tianjiao
    Gao, Bo
    FRONTIERS IN GENETICS, 2021, 12
  • [26] Security Orchestration with Explainability for Digital Twins-based Smart Systems
    Nguyen, Minh-Tri
    Lam, An Ngoc
    Nguyen, Phu
    Truong, Hong-Linh
    2024 IEEE 48TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC 2024, 2024, : 1194 - 1203
  • [27] Engineering Management Models for Urban Security
    Muaafa, Mohammed
    Ramirez-Marquez, Jose Emmanuel
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2017, 64 (01) : 29 - 41
  • [28] NETWORK SECURITY POLICY MODELS
    VARADHARAJAN, V
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 453 : 74 - 95
  • [29] Tactical Orchestration Network, Security, and Drone Intelligence for Mission-Critical Operations
    Suomalainen, Jani
    Ahola, Kimmo
    Sailio, Mirko
    Kiss, Gabor
    Megyaszai, Gabor
    Asif, Rizwan
    Jehkonen, Petri
    Rivalan, Jonathan
    2024 JOINT EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS & 6G SUMMIT, EUCNC/6G SUMMIT 2024, 2024, : 1061 - 1066
  • [30] SecMANO: Towards Network Functions Virtualization (NFV) based Security MANagement and Orchestration
    Pattaranantakul, Montida
    He, Ruan
    Meddahi, Ahmed
    Zhang, Zonghua
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 598 - 605