Publications
A two-constraint approach to risky cybersecurity experiment management
Abstract
Cybersecurity research demands extensive experimentation to be validated. This experimentation is inherently risky: it may involve any combination of live malicious code, disruptive actions and connectivity to the active Internet. Previously, risky experiments were heavily contained to reduce danger to the experimental infrastructure and the Internet. We argue that such an approach unnecessarily stifles research. In this paper we explore a collaborative two-tiered risky experiment management model. It incorporates input from both experimenters and testbed operators; each party specifies constraints on their component’s behavior. Experiment constraints limit behavior in ways that do not affect an experiment's validity, thus meeting usability goals. Testbed constraints build on experiment constraints to meet required safety goals. When combined, experiment and testbed constraints ensure that experiments are both useful to researchers and safe for the testbed and the Internet.
Metadata
- publication
- Invited paper at the Sarnoff Symposium, 2008
- year
- 2008
- publication date
- 2008/4
- authors
- John Wroclawski, Jelena Mirkovic, Ted Faber, Stephen Schwab
- link
- https://deter-project.org/sites/default/files/files/Sarnoff-T1T2.pdf
- resource_link
- https://deter-project.org/sites/default/files/files/Sarnoff-T1T2.pdf
- journal
- Invited paper at the Sarnoff Symposium