A Two-Constraint Approach to Risky CyberSecurity Experiment Management
نویسندگان
چکیده
— Cybersecurity research demands extensive experimentation to be validated. This experimentation is inherently risky: it may involve any combination of live malicious code, disruptive actions and connectivity to the active Internet. Previously, risky experiments were heavily contained to reduce danger to the experimental infrastructure and the Internet. We argue that such an approach unnecessarily stifles research. In this paper we explore a collaborative two-tiered risky experiment management model. It incorporates input from both experimenters and testbed operators; each party specifies constraints on their component's behavior. Experiment constraints limit behavior in ways that do not affect an experiment's validity, thus meeting usability goals. Testbed constraints build on experiment constraints to meet required safety goals. When combined, experiment and testbed constraints ensure that experiments are both useful to researchers and safe for the testbed and the Internet.
منابع مشابه
Effect of group psychotherapy in light of glasser approach on risky behavior
Nowadays, it could be reasonably argued that addressing health issue and contributory factors behind it is vitally important. The prevalence of risky behavior among different groups, especially in teenagers, is one of the most serious health threats. This study aims to determine the effect of group psychotherapy in light of glasser approach on risky behavior. The research is semi-experimental d...
متن کاملHuman factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours
The present study explored the relationship between risky cybersecurity behaviours, attitudes towards cybersecurity in a business environment, Internet addiction, and impulsivity. 538 participants in part-time or full-time employment in the UK completed an online questionnaire, with responses from 515 being used in the data analysis. The survey included an attitude towards cybercrime and cybers...
متن کاملOptimal portfolio allocation with imposed price limit constraint
Daily price limits are adopted by many securities exchanges in countries such as the USA, Canada, Japan and various other countries in Europe and Asia, in order to increase the stability of the financial market. These limits confine the price of the financial asset during all trading stages of any trading day to a range, usually determined based on the previous day’s closing price. In this pape...
متن کاملA Two-Phase Simulation-Based Optimization of Hauling System in Open-Pit Mine
One of the key issues in mining is the hauling system. Truck and shovels are the most widely used transportation equipment in mines. In this paper, a two-phase simulation-based optimization is presented to maximize utilization of hauling system in the largest Iranian open-pit copper mine. In the first phase, The OptQuest for Arena software package was used to solve the optimization problem to p...
متن کاملBe Prepared: How US Government Experts Think About Cybersecurity
Online security experiences, perceptions, and behaviors are key to understanding users security practices. Users express that they are concerned about online security, but they also express frustration in navigating the often confusing and mentally taxing cybersecurity world. This paper examines the differences in cybersecurity perception and behavior between cybersecurity experts in the US Gov...
متن کامل