Blockchain-based automated and robust cyber security management
Document Type
Article
Publication Date
5-1-2022
Abstract
We initiate the study on the problem of automated and robust Cyber Security Management (CSM). We exemplify the problem by investigating how CSM should respond to the discovery of cyber intelligence that identifies new attackers, victims, or defense capabilities. Given the complexity of CSM, we divide it into three classes, referred to as Network-centric (N-CSM), Tools-centric (T-CSM) and Application-centric (A-CSM). These lead to a range of functions for examining whether, and to what extent, a network has been compromised. Moreover, we propose to incorporate blockchain (via Hyperledger Fabric) to build a decentralized CSM system, dubbed B2CSM, that ensures the retrieval of valid invocation results for CSM purposes. We also integrate B2CSM with a decentralized storage network (DSN), instantiated by InterPlanetary File System (IPFS), to reduce on-chain storage costs without hindering its robustness. We present the design and implementation of the prototype B2CSM system. Experiments with real-world datasets show that the CSM solutions and system are effective and efficient.
Identifier
85124186957 (Scopus)
Publication Title
Journal of Parallel and Distributed Computing
External Full Text Location
https://doi.org/10.1016/j.jpdc.2022.01.002
ISSN
07437315
First Page
62
Last Page
82
Volume
163
Grant
FA8750-19-1-0019
Fund Ref
Air Force Office of Scientific Research
Recommended Citation
He, Songlin; Ficke, Eric; Pritom, Mir Mehedi Ahsan; Chen, Huashan; Tang, Qiang; Chen, Qian; Pendleton, Marcus; Njilla, Laurent; and Xu, Shouhuai, "Blockchain-based automated and robust cyber security management" (2022). Faculty Publications. 2995.
https://digitalcommons.njit.edu/fac_pubs/2995