Deploying crowd-sourced formal verification systems in a DoD network
Author
Dumlupinar, Mahmut Firuz
Date
2013-09Advisor
Xie, Geoffrey G.
Second Reader
Housel, Thomas J.
Metadata
Show full item recordAbstract
Manual formal software verification is an expensive and time-consuming process. Military software is currently verified manually by highly skilled analysts. To reduce the high costs of the formal verification, DARPA started a Crowd-Sourced Formal Verification (CSFV) program that aims to include as many people as possible to participate in this verification process by embedding some of the verification logics into computer games. In this study we built a network prototype for hosting a CSFV server on a DoD network. The CSFV network prototype is designed according to the common security practices, necessary security measures against possible attacks, and the Security Technical Implementation Guides (STIGs) published by DISA to provide confidentiality, integrity and availability. Important details are presented about server operating system selections, proper usage of necessary network services, and firewall and IDS rules for efficient network security. Results from common network penetration test tools confirm that our prototype meets the necessary security requirements and can be trusted on a DoD network.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Verification and Validation of the Malicious Activity Simulation Tool (MAST) for Network Administrator Training and Evaluation
Neff, Justin M. (Monterey, California. Naval Postgraduate School, 2012-03);The DoD currently employs red teams to conduct network infiltration and security training for network administrators and operators. Red Teams provide the most realistic and thorough training to defend against real-world ... -
XML based adaptive IPsec policy management in a trust management context
Mohan, Raj. (Monterey, California. Naval Postgraduate School, 2003-12);TCP/IP provided the impetus for the growth of the Internet and the IPsec protocol now promises to add to it the desired security strength. IPsec provides users with a mechanism to enforce a range of security services for ... -
An Editor for Adaptive XML-Based Policy Management of IPSEC
Mohan, Raj; Levin, Timothy E.; Irvine, Cynthia E. (Computer Security Applications Conference (ACSAC), 2003-12-08);The IPSec protocol provides a mechanism to enforce a range of security services for both confidentiality and integrity, enabling secure transmission of information across networks. Dynamic parameterization of IPSec, via ...