Investigating Survivability of Configuration Management Tools in Unreliable and Hostile Networks

Karvinen, T. and Li, Shuliang (2017) Investigating Survivability of Configuration Management Tools in Unreliable and Hostile Networks. In: Proceedings of 2017 3rd International Conference on Information Management (ICIM 2017), 21 to end of 23 Apr 2017, Chengdu, China..

[img]
Preview
PDF
ICIM2017 Paper by Tero Karvinen and Shuliang Li Repository.pdf - Accepted Version

Download (438kB) | Preview
Official URL: https://dx.doi.org/10.1109/INFOMAN.2017.7950402

Abstract

A configuration management system (CMS) can control large networks of computers. A modern CMS is idempotent and describes infrastructure as code, so that it uses a description of the desired state of a system to automatically correct any deviations from a defined goal. As this requires both complete control of the slave systems and unquestioned ability to provide new instructions to slaves, the CMS is highly valuable target for attackers. Criminal malware networks already survive in hostile, heterogeneous networks, and therefore, the concepts from those systems could be applied to benign enterprise CMSs. We describe one such concept, the hidden master architecture, and compare its survivability to existing systems using attack trees.

Item Type: Conference or Workshop Item (Paper)
Uncontrolled Keywords: Configuration management system; survivability; attack tree; command and control; botnet;
Subjects: University of Westminster > Westminster Business School
SWORD Depositor: repository@westminster.ac.uk
Depositing User: repository@westminster.ac.uk
Date Deposited: 21 Feb 2017 16:35
Last Modified: 22 Jun 2017 08:21
URI: http://westminsterresearch.wmin.ac.uk/id/eprint/18537

Actions (login required)

Edit Item (Repository staff only) Edit Item (Repository staff only)