Multilayer Network Models for Coordinating Orchestration of Systems Security Engineering

被引:0
|
作者
Williams, Adam D. [1 ]
Birch, Gabriel C. [2 ]
Caskey, Susan A. [3 ]
Fleming, Elizabeth S. [4 ]
机构
[1] Sandia National Laboratories*, P.O. Box 5800, Albuquerque,NM,87185-1371, United States
[2] Sandia National Laboratories, P.O. Box 5800, Albuquerque,NM,87185-1006, United States
[3] Sandia National Laboratories, P.O. Box 5800, Albuquerque,NM,87185-1371, United States
[4] Sandia National Laboratories, P.O. Box 5800, Albuquerque,NM,87185-0152, United States
关键词
Complex networks;
D O I
10.1002/iis2.12949
中图分类号
学科分类号
摘要
Systems security engineering (SSE) faces new internal (e.g., increased digitization) and external (e.g., adversary capabilities) obstacles as systems increase in complexity and are deployed to increasingly challenging operating environments. Legacy approaches heavily rely on individual, physical, digital, or personnel domain-specific strategies for security. Such segmented responses helped initiate efforts by the INCOSE systems security working group to identify fundamental elements of SSE. One of these fundamental elements is security orchestration, where the SSE goal is to coordinate between previously disparate security solutions. Multilayer network-based approaches seemingly provide the logical structure and mathematical foundation to conduct security orchestration for tightly coupled coordinated system defense in cyber-relevant time. Within multilayer networks, the ability to identify and manipulate cross-domain (e.g., intralayer) connections that influence security performance measures demonstrates an enhanced level of security orchestration. As such, multilayer networks support the future of SSE efforts to mitigate real-world complexities, innovative adversaries, and disruptive technologies. After describing security orchestration as a concept and foundational element, this paper explores how multilayer network models can enhance orchestration systems security engineering. Additionally, a demonstration case of systems security for a high consequence facility (as a complex system) is followed insights and implications for incorporating orchestration in the future of systems security. Copyright © 2022 by Adam D. Williams, Gabriel C. Birch, Susan A. Caskey, and Elizabeth S. Fleming. Permission granted to INCOSE to publish and use.
引用
收藏
页码:565 / 578
相关论文
共 50 条
  • [41] Boolean-Valued Models of Telecommunication Systems in Some Problems of Network Security
    Shcherba, E. V.
    2015 INTERNATIONAL SIBERIAN CONFERENCE ON CONTROL AND COMMUNICATIONS (SIBCON), 2015,
  • [42] Security Engineering in a System of Systems Environment
    Dahmann, J.
    Rebovich, G.
    McEvilley, M.
    Turner, G.
    2013 7TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON 2013), 2013, : 364 - 369
  • [43] Introduction to Systems Security Engineering Vocabulary
    1600, John Wiley and Sons Inc (23): : 9 - 10
  • [44] Multilayer network simplification: Approaches, models and methods
    Interdonato, Roberto
    Magnani, Matteo
    Perna, Diego
    Tagarelli, Andrea
    Vega, Davide
    COMPUTER SCIENCE REVIEW, 2020, 36
  • [45] OPTICAL-SYSTEMS FOR SECURITY ENGINEERING
    RYSER, P
    OPTICAL ENGINEERING, 1995, 34 (09) : 2670 - 2674
  • [46] Automatic Intent-Based Secure Service Creation Through a Multilayer SDN Network Orchestration
    Szyrkowiec, Thomas
    Santuari, Michele
    Chamania, Mohit
    Siracusa, Domenico
    Autenrieth, Achim
    Lopez, Victor
    Cho, Joo
    Kellerer, Wolfgang
    JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2018, 10 (04) : 289 - 297
  • [47] A Study of Network Security Systems
    Khalil, Ramy K.
    Zaki, Fayez W.
    Ashour, Mohamed M.
    Mohamed, Mohamed A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (06): : 204 - 212
  • [48] A Study of Network Security Systems
    Khalil, Ramy K.
    Zaki, Fayez W.
    Ashour, Mohamed M.
    Mohamed, Mohamed A.
    SELECTED TOPICS IN APPLIED COMPUTER SCIENCE, 2010, : 96 - +
  • [49] Network Systems Security Analysis
    Yilmaz, Ismail
    CYBER SENSING 2015, 2015, 9458
  • [50] Network engineering for agile belief network models
    Laskey, KB
    Mahoney, SM
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2000, 12 (04) : 487 - 498