A System-Aware Cyber Security architecture

被引:32
作者
Jones, Rick A. [1 ]
Horowitz, Barry [1 ]
机构
[1] Univ Virginia, Charlottesville, VA 22904 USA
基金
美国国家科学基金会;
关键词
adaptive security; configuration hopping; cyber security; data integrity; evidence based; forensics; goal structuring notation; GSN; moving target; structured argument; System-Aware;
D O I
10.1002/sys.21206
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
As exemplified in the 2010 Stuxnet attack on an Iranian nuclear facility, attackers have the capabilities to embed infections in equipment that is employed in nuclear power systems. In this paper, a new systems engineering focused approach for mitigating such risks is described. This approach involves the development of a security architectural formulation that integrates a set of reusable security services as an architectural solution that is an embedded component of the system to be protected. The System-Aware architectural approach embeds security components into the system to be protected. The architecture includes services that (1) collect and assess real-time security relevant measurements from the system being protected, (2) perform security analysis on those measurements, and (3) execute system security control actions as required. This architectural formulation results in a defense that is referred to as System-Aware Cyber Security. This includes (1) the integration of a diverse set of dynamically interchangeable redundant subsystems involving hardware and software components provided from multiple vendors to significantly increase the difficulty for adversaries by avoiding a monoculture environment, (2) the development of subsystems that are capable of rapidly changing their attack surface through hardware and software reconfiguration (configuration hopping) in response to perceived threats, (3) data consistency checking services (e.g., intelligent voting mechanisms) for isolating faults and permitting moving surface control actions to avoid operations in a compromised configuration, and (4) forensic analysis techniques for rapid post-attack categorization of whether a given fault is more likely the result of an infected embedded hardware or software component (i.e., cyber attack) or a natural failure. In this paper we present these key elements of the System-Aware Cyber Security architecture and show, including an application example, how they can be integrated to mitigate the risks of insider and supply chain attacks. In addition, this paper outlines an initial vision for a security analysis framework to compare alternative System-Aware security architectures. Finally, we summarize future research that is necessary to facilitate implementation across additional domains critical to the nation's interest. (c) 2012 Wiley Periodicals, Inc. Syst Eng
引用
收藏
页码:225 / 240
页数:16
相关论文
共 25 条
  • [1] Albright D., 2010, Technical Report
  • [2] [Anonymous], 2009, GUID IND EV BAS REV
  • [3] [Anonymous], 2011, W32.Stuxnet Dossier
  • [4] [Anonymous], AUSCRYPT 92
  • [5] [Anonymous], 2002, Writing Secure Code
  • [6] [Anonymous], GUID IND FDA STAFF T
  • [7] An Architectural Systems Engineering Methodology for Addressing Cyber Security
    Bayuk, Jennifer L.
    Horowitz, Barry M.
    [J]. SYSTEMS ENGINEERING, 2011, 14 (03) : 294 - 304
  • [8] Cai J., 2006, 1577 U WISC
  • [9] Civitas: Toward a secure voting system
    Clarkson, Michael R.
    Chong, Stephen
    Myers, Andrew C.
    [J]. PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, : 354 - 368
  • [10] Defense Science Board, 2005, HIGH PERF MICR SUPPL