Handling undiscovered vulnerabilities using a Provenance network

Amrit'anshu Thakur, Rayford Vaughn, Valentine Anantharaj

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper elaborates on a novel approach at preventing exploits from vulnerabilities which remain uncovered during the testing phase of a system's development lifecycle. The combination of predicted usage patterns, a Provenance network model and a clustering methodology provide a secure failure mechanism for both known and unknown security issues within the system. The paper also addresses of the requisite supporting infrastructure and deployment issues related to the model. The idea is to approach the growing problem of newer and more complex vulnerabilities in an ever more intricate and vast set of systems using a generic software state mapping procedure for recognizable (and thus the complementary unrecognizable) patterns to judge the stability at each step in an operation sequence. Thus abstracting these vulnerabilities at a higher level provides us a generic technique to classify and handle such concerns in the future and in turn prevent exploits before a corrective patch is released.

Original languageEnglish
Title of host publicationWMSCI 2008 - The 12th World Multi-Conference on Systemics, Cybernetics and Informatics, Jointly with the 14th International Conference on Information Systems Analysis and Synthesis, ISAS 2008 - Proc.
Pages125-130
Number of pages6
StatePublished - 2008
Externally publishedYes
Event12th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2008, Jointly with the 14th International Conference on Information Systems Analysis and Synthesis, ISAS 2008 - Orlando, FL, United States
Duration: Jun 29 2008Jul 2 2008

Publication series

NameWMSCI 2008 - The 12th World Multi-Conference on Systemics, Cybernetics and Informatics, Jointly with the 14th International Conference on Information Systems Analysis and Synthesis, ISAS 2008 - Proc.
Volume5

Conference

Conference12th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2008, Jointly with the 14th International Conference on Information Systems Analysis and Synthesis, ISAS 2008
Country/TerritoryUnited States
CityOrlando, FL
Period06/29/0807/2/08

Fingerprint

Dive into the research topics of 'Handling undiscovered vulnerabilities using a Provenance network'. Together they form a unique fingerprint.

Cite this