TY - GEN
T1 - Handling undiscovered vulnerabilities using a Provenance network
AU - Thakur, Amrit'anshu
AU - Vaughn, Rayford
AU - Anantharaj, Valentine
PY - 2008
Y1 - 2008
N2 - This paper elaborates on a novel approach at preventing exploits from vulnerabilities which remain uncovered during the testing phase of a system's development lifecycle. The combination of predicted usage patterns, a Provenance network model and a clustering methodology provide a secure failure mechanism for both known and unknown security issues within the system. The paper also addresses of the requisite supporting infrastructure and deployment issues related to the model. The idea is to approach the growing problem of newer and more complex vulnerabilities in an ever more intricate and vast set of systems using a generic software state mapping procedure for recognizable (and thus the complementary unrecognizable) patterns to judge the stability at each step in an operation sequence. Thus abstracting these vulnerabilities at a higher level provides us a generic technique to classify and handle such concerns in the future and in turn prevent exploits before a corrective patch is released.
AB - This paper elaborates on a novel approach at preventing exploits from vulnerabilities which remain uncovered during the testing phase of a system's development lifecycle. The combination of predicted usage patterns, a Provenance network model and a clustering methodology provide a secure failure mechanism for both known and unknown security issues within the system. The paper also addresses of the requisite supporting infrastructure and deployment issues related to the model. The idea is to approach the growing problem of newer and more complex vulnerabilities in an ever more intricate and vast set of systems using a generic software state mapping procedure for recognizable (and thus the complementary unrecognizable) patterns to judge the stability at each step in an operation sequence. Thus abstracting these vulnerabilities at a higher level provides us a generic technique to classify and handle such concerns in the future and in turn prevent exploits before a corrective patch is released.
UR - http://www.scopus.com/inward/record.url?scp=84869396383&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84869396383
SN - 1934272353
SN - 9781934272350
T3 - WMSCI 2008 - The 12th World Multi-Conference on Systemics, Cybernetics and Informatics, Jointly with the 14th International Conference on Information Systems Analysis and Synthesis, ISAS 2008 - Proc.
SP - 125
EP - 130
BT - WMSCI 2008 - The 12th World Multi-Conference on Systemics, Cybernetics and Informatics, Jointly with the 14th International Conference on Information Systems Analysis and Synthesis, ISAS 2008 - Proc.
T2 - 12th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2008, Jointly with the 14th International Conference on Information Systems Analysis and Synthesis, ISAS 2008
Y2 - 29 June 2008 through 2 July 2008
ER -