A Two-Constraint Approach to Risky CyberSecurity Experiment Management

نویسندگان

  • John Wroclawski
  • Jelena Mirkovic
  • Ted Faber
  • Stephen Schwab
چکیده

— Cybersecurity research demands extensive experimentation to be validated. This experimentation is inherently risky: it may involve any combination of live malicious code, disruptive actions and connectivity to the active Internet. Previously, risky experiments were heavily contained to reduce danger to the experimental infrastructure and the Internet. We argue that such an approach unnecessarily stifles research. In this paper we explore a collaborative two-tiered risky experiment management model. It incorporates input from both experimenters and testbed operators; each party specifies constraints on their component's behavior. Experiment constraints limit behavior in ways that do not affect an experiment's validity, thus meeting usability goals. Testbed constraints build on experiment constraints to meet required safety goals. When combined, experiment and testbed constraints ensure that experiments are both useful to researchers and safe for the testbed and the Internet.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Effect of group psychotherapy in light of glasser approach on risky behavior

Nowadays, it could be reasonably argued that addressing health issue and contributory factors behind it is vitally important. The prevalence of risky behavior among different groups, especially in teenagers, is one of the most serious health threats. This study aims to determine the effect of group psychotherapy in light of glasser approach on risky behavior. The research is semi-experimental d...

متن کامل

Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours

The present study explored the relationship between risky cybersecurity behaviours, attitudes towards cybersecurity in a business environment, Internet addiction, and impulsivity. 538 participants in part-time or full-time employment in the UK completed an online questionnaire, with responses from 515 being used in the data analysis. The survey included an attitude towards cybercrime and cybers...

متن کامل

Optimal portfolio allocation with imposed price limit constraint

Daily price limits are adopted by many securities exchanges in countries such as the USA, Canada, Japan and various other countries in Europe and Asia, in order to increase the stability of the financial market. These limits confine the price of the financial asset during all trading stages of any trading day to a range, usually determined based on the previous day’s closing price. In this pape...

متن کامل

A Two-Phase Simulation-Based Optimization of Hauling System in Open-Pit Mine

One of the key issues in mining is the hauling system. Truck and shovels are the most widely used transportation equipment in mines. In this paper, a two-phase simulation-based optimization is presented to maximize utilization of hauling system in the largest Iranian open-pit copper mine. In the first phase, The OptQuest for Arena software package was used to solve the optimization problem to p...

متن کامل

Be Prepared: How US Government Experts Think About Cybersecurity

Online security experiences, perceptions, and behaviors are key to understanding users security practices. Users express that they are concerned about online security, but they also express frustration in navigating the often confusing and mentally taxing cybersecurity world. This paper examines the differences in cybersecurity perception and behavior between cybersecurity experts in the US Gov...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008