Title :
Cyber Analysis System Toolkit: A high-fidelity, virtual cyber test-bed for network modeling and experimentation
Author :
Chidambaram, B. ; Yueli Yang
Author_Institution :
Boeing Res. & Technol., Ridley Park, PA, USA
fDate :
Oct. 29 2012-Nov. 1 2012
Abstract :
There is a growing need to defend networked information systems from cyber-attacks. Cyber security analysis tools are key enablers in analyzing the attacks and developing defenses. In this paper, we present the Cyber Analysis System Toolkit (CAST), a high-fidelity, scalable, virtual test-bed for cyber systems modeling, experimentation and analysis. At the heart of CAST is the Common Open Research Emulator (CORE). CORE uses network emulation techniques that provide a high degree of modeling fidelity while maintaining network scalability. We use CAST to develop network emulations of a representative security model called Virtual Secure Enclaves (VSE). We evaluate different security model implementation options (including defense-in-depth concepts) for this illustrative example. The design options include combinations of firewalls and TLS VPNs, firewalls and IPsec VPNs, and defense-in-depth concepts that use multiple layers of these combinations. We use these models to analyze and quantify network performance metrics such as latency and throughput. For example, by adding two layers of TLS and IPsec VPNs, we see that latencies increase by ~400msecs for representative video traffic. We have also investigated latencies for a variety of traffic types. Our main contribution is a real-time, high-fidelity model of a representative 100-node operational network with embedded security features.
Keywords :
firewalls; information systems; virtual private networks; 100-node operational network; CAST; CORE; IPsec VPN; TLS VPN; VSE; common open research emulator; cyber analysis system toolkit; cyber security analysis tools; cyber systems modeling; cyber-attacks; defense-in-depth concepts; embedded security features; fidelity modeling; firewalls; high-fidelity model; high-fidelity test-bed; network emulation techniques; network experimentation; network modeling; network scalability; networked information systems; quantify network performance metrics; security model implementation options; video traffic; virtual cyber test-bed; virtual secure enclaves; Analytical models; Computational modeling; Computer architecture; Emulation; Real-time systems; Security; Virtual private networks; Cyber security; emulation; network; performance;
Conference_Titel :
MILITARY COMMUNICATIONS CONFERENCE, 2012 - MILCOM 2012
Conference_Location :
Orlando, FL
Print_ISBN :
978-1-4673-1729-0
DOI :
10.1109/MILCOM.2012.6415831