Policy-Based vulnerability assessment for virtual organisations

  • Authors:
  • Jan Muhammad;Thomas Doherty;Sardar Hussain;Richard Sinnott

  • Affiliations:
  • National e-Science Centre, University of Glasgow, UK;National e-Science Centre, University of Glasgow, UK;National e-Science Centre, University of Glasgow, UK;Department of Computing and Information Systems, University of Melbourne, Melbourne, Victoria, Australia

  • Venue:
  • CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

E-Infrastructures can be used to support e-science and e-research allowing different collaborators from disparate organisations, often from different disciplines and utilising heterogeneous software and hardware, to work together on common research problems. This is typically achieved through the formation of targeted Virtual Organisations (VO). Inter-organisational collaborations also bring challenges of security that must be overcome. There has been much work in e-Research-oriented security, i.e. at the middleware level, but far less on ensuring that middleware-oriented security is not made redundant through ensuring the robustness of the underlying hardware and software (fabric) upon which the e-Research middleware security is based, e.g. the operating systems, network configurations and core software required to support e-Research solutions. To tackle this, an integrated security framework is needed that is cognisant of VO requirements on e-Research middleware-oriented security and incorporates targeted fabric level security. In this paper we present an integrated architecture (ACVAS), which encompasses VO-specific fabric security including configuration-aware security monitoring (patch status monitoring) and vulnerability scanning and subsequent updating. We show how tool support can be used to pre-emptively identify and assess potential vulnerabilities in a VO, before they are potential exploited. We also outline how these vulnerabilities can be dynamically overcome to support the needs of the VO and associated e-Infrastructure to improve the overall VO security.