• DocumentCode
    1782750
  • Title

    Security configuration analytics using video games

  • Author

    Alsaleh, Mohammed Noraden ; Al-Shaer, Ehab Alsaleh

  • Author_Institution
    Univ. of North Carolina at Charlotte, Charlotte, NC, USA
  • fYear
    2014
  • fDate
    29-31 Oct. 2014
  • Firstpage
    256
  • Lastpage
    264
  • Abstract
    Computing systems today have a large number of security configuration settings that enforce security properties. However, vulnerabilities and incorrect configuration increase the potential for attacks. Provable verification and simulation tools have been introduced to eliminate configuration conflicts and weaknesses, which can increase system robustness against attacks. Most of these tools require special knowledge in formal methods and precise specification for requirements in special languages, in addition to their excessive need for computing resources. Video games have been utilized by researchers to make educational software more attractive and engaging. Publishing these games for crowdsourcing can also stimulate competition between players and increase the game educational value. In this paper we introduce a game interface, called NetMaze, that represents the network configuration verification problem as a video game and allows for attack analysis. We aim to make the security analysis and hardening usable and accurately achievable, using the power of video games and the wisdom of crowdsourcing. Players can easily discover weaknesses in network configuration and investigate new attack scenarios. In addition, the gameplay scenarios can also be used to analyze and learn attack attribution considering human factors. In this paper, we present a provable mapping from the network configuration to 3D game objects.
  • Keywords
    computer games; courseware; formal verification; human factors; security of data; specification languages; user interfaces; 3D game object; NetMaze; attack analysis; attack attribution; computing systems; configuration conflict; crowdsourcing; educational software; formal methods; game educational value; game interface; gameplay scenario; human factor; network configuration verification problem; provable mapping; provable verification; security analysis; security configuration analytics; security configuration settings; security property; simulation tool; special languages; system robustness; video games; vulnerability; Communication networks; Computational modeling; Conferences; Games; Network topology; Security; Topology;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications and Network Security (CNS), 2014 IEEE Conference on
  • Conference_Location
    San Francisco, CA
  • Type

    conf

  • DOI
    10.1109/CNS.2014.6997493
  • Filename
    6997493