Leveraging Data Provenance to Enhance Cyber Resilience

Thomas Moyer, Karishma Chadha, Robert Cunningham, Nabil Schear, Warren Smith, Adam Bates, Kevin Butler, Frank Capobianco, Trent Jaeger, Patrick Cable

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

Building secure systems used to mean ensuring a secure perimeter, but that is no longer the case. Today's systems are ill-equipped to deal with attackers that are able to pierce perimeter defenses. Data provenance is a critical technology in building resilient systems that will allow systems to recover from attackers that manage to overcome the "hard-shell" defenses. In this paper, we provide background information on data provenance, details on provenance collection, analysis, and storage techniques and challenges. Data provenance is situated to address the challenging problem of allowing a system to "fight-through" an attack, and we help to identify necessary work to ensure that future systems are resilient.

Original languageEnglish (US)
Title of host publicationProceedings - 2016 IEEE Cybersecurity Development, SecDev 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages107-114
Number of pages8
ISBN (Electronic)9781509055883
DOIs
StatePublished - Feb 1 2017
Event2016 IEEE Cybersecurity Development, SecDev 2016 - Boston, United States
Duration: Nov 3 2016Nov 4 2016

Publication series

NameProceedings - 2016 IEEE Cybersecurity Development, SecDev 2016

Other

Other2016 IEEE Cybersecurity Development, SecDev 2016
CountryUnited States
CityBoston
Period11/3/1611/4/16

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Software
  • Safety, Risk, Reliability and Quality

Cite this