Date of Award

2022

Document Type

Dissertation

Degree Name

Doctor of Philosophy (PhD)

Department

Computer Science

Committee Chair

Mikel D. Petty

Committee Member

Harry Delugach

Committee Member

Feng Zhu

Committee Member

Mary Ellen Weisskopf

Committee Member

Derek Newland

Subject(s)

Cyberspace--Security measures, Computer security, Petri nets

Abstract

Modern society is increasingly reliant on computer systems for nearly all aspects of life, and the security of those systems has become an urgent concern. A research program that consists of several interconnected research projects in cybersecurity modeling has to date included the definition of a form of Petri nets extended with additional features specific to modeling cyberattacks, the automated generation of executable cyberattack component models from an attack pattern database, formal representation, and machine learning of attacker and defender strategies during cyberattacks, and the verification and validation of the component models. Because computer systems targeted in cyberattacks may have multiple and/or previously unknown vulnerabilities, there is a need to combine or compose the component models into integrated composite models that represent a target system. In response, methods and supporting software for the selection and composition of those component models were developed in this work. A repository to store the component models was implemented, and component model metadata to assist a user in selecting the appropriate models to compose was defined. Both were tested. Several composition operations and two different forms or levels of composition, coarse-grain, and fine-grain, were defined. Course-grain composition combines models of attack patterns to model complete target systems, whereas fine-grain the composition combines models of individual attack techniques to model new attack patterns. Both forms of composition required the addition of specific model elements to support the composition operations. Both levels of composition were tested using multiple use cases. The resulting composite models were checked for compliance with the modeling formalism and then run using a simulator to confirm that the models were executable. The results of simulations were consistent with real-world experience.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.