Modeling and detecting the cascade vulnerability problem using soft constraints

  • Authors:
  • Stefano Bistarelli;Simon N. Foley;Barry O'Sullivan

  • Affiliations:
  • Università di Chieti-Pescara, Italy Istituto di Informatica e Telematica, C.N.R., Pisa, Italy;University College Cork, Ireland;University College Cork, Ireland

  • Venue:
  • Proceedings of the 2004 ACM symposium on Applied computing
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Establishing network security is based not just on the security of its component systems but also on how they are configured to interoperate. In this paper we consider how soft constraints provide an approach to detecting the cascade vulnerability problem: whether system interoperation provides circuitous or cascading routes across the network that increase the risk of violation of multilevel security. Taking the constraints approach means that we are building on techniques that have proven success in solving large-scale problems from other domains.