Multilayer Network Models for Coordinating Orchestration of Systems Security Engineering

被引:0
|
作者
Williams, Adam D. [1 ]
Birch, Gabriel C. [2 ]
Caskey, Susan A. [3 ]
Fleming, Elizabeth S. [4 ]
机构
[1] Sandia National Laboratories*, P.O. Box 5800, Albuquerque,NM,87185-1371, United States
[2] Sandia National Laboratories, P.O. Box 5800, Albuquerque,NM,87185-1006, United States
[3] Sandia National Laboratories, P.O. Box 5800, Albuquerque,NM,87185-1371, United States
[4] Sandia National Laboratories, P.O. Box 5800, Albuquerque,NM,87185-0152, United States
关键词
Complex networks;
D O I
10.1002/iis2.12949
中图分类号
学科分类号
摘要
Systems security engineering (SSE) faces new internal (e.g., increased digitization) and external (e.g., adversary capabilities) obstacles as systems increase in complexity and are deployed to increasingly challenging operating environments. Legacy approaches heavily rely on individual, physical, digital, or personnel domain-specific strategies for security. Such segmented responses helped initiate efforts by the INCOSE systems security working group to identify fundamental elements of SSE. One of these fundamental elements is security orchestration, where the SSE goal is to coordinate between previously disparate security solutions. Multilayer network-based approaches seemingly provide the logical structure and mathematical foundation to conduct security orchestration for tightly coupled coordinated system defense in cyber-relevant time. Within multilayer networks, the ability to identify and manipulate cross-domain (e.g., intralayer) connections that influence security performance measures demonstrates an enhanced level of security orchestration. As such, multilayer networks support the future of SSE efforts to mitigate real-world complexities, innovative adversaries, and disruptive technologies. After describing security orchestration as a concept and foundational element, this paper explores how multilayer network models can enhance orchestration systems security engineering. Additionally, a demonstration case of systems security for a high consequence facility (as a complex system) is followed insights and implications for incorporating orchestration in the future of systems security. Copyright © 2022 by Adam D. Williams, Gabriel C. Birch, Susan A. Caskey, and Elizabeth S. Fleming. Permission granted to INCOSE to publish and use.
引用
收藏
页码:565 / 578
相关论文
共 50 条
  • [31] Research on Network Security Automation and Orchestration Oriented to Electric Power Monitoring System
    Ling, Xiaobo
    Qi, Longyun
    Li, Man
    Yan, Jun
    CLOUD COMPUTING, CLOUDCOMP 2021, 2022, 430 : 195 - 206
  • [32] Systems engineering models
    Jackson, K
    Stevens, R
    COMPUTING & CONTROL ENGINEERING JOURNAL, 2000, 11 (04): : 187 - 194
  • [33] Engineering self-coordinating real-time systems
    Rammig, Franz J.
    10TH IEEE INTERNATIONAL SYMPOSIUM ON OBJECT AND COMPONENT-ORIENTED REAL-TIME DISTRIBUTED COMPUTING, PROCEEDINGS, 2007, : 21 - 28
  • [34] Robustness Analysis of Public Transportation Systems in Seoul Using General Multilayer Network Models
    Lee, Seokjin
    Kim, Seongryong
    Kim, Jungeun
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (18): : 26589 - 26613
  • [36] Toward Engineering of Security of Information Systems: The Security Acts
    Goudalo, Wilson
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS AND TECHNOLOGIES (SECURWARE 2011), 2011, : 44 - 50
  • [37] Models in Systems Engineering and Software Engineering
    Andary, James F.
    Frisch, Harry P.
    Oliver, David W.
    Insight, 2007, 3 (26-27) : 26 - 27
  • [38] Orchestration of Wired and Wireless Systems for Future Mobile Transport Network
    Pham Tien Dat
    Kanno, Atsushi
    Yamamoto, Naokatsu
    Kawanishi, Tetsuya
    PROCEEDINGS OF 202013TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR COMMUNICATIONS (ATC 2020), 2020, : 70 - 73
  • [39] Models for Assessing the Security of Network Information Systems against Negative External Influences
    Yu. Yu. Gromov
    V. M. Tyutyunnik
    Automatic Documentation and Mathematical Linguistics, 2021, 55 : 196 - 202
  • [40] Models for Assessing the Security of Network Information Systems against Negative External Influences
    Gromov, Yu Yu
    Tyutyunnik, V. M.
    AUTOMATIC DOCUMENTATION AND MATHEMATICAL LINGUISTICS, 2021, 55 (05) : 196 - 202