Session

Weekend Poster Session 1

Location

Utah State University, Logan, UT

Abstract

As the number of space vehicles launched into outer space increases over time, the need to determine and counter possible cyber attacks from malicious agents will drastically increase. A potential solution to this problem is to create a cloud architecture that a spacecraft can use for autonomous detection or recovery from cyber attacks when out range of a ground station. For this work, the development of a new cloud architecture for space vehicles is proposed which allows users to control access to information or applications within the system while using the self-healing capabilities of containers. The cloud architecture will first be tested without the use of any containerization to establish a control. Afterwards, experiments will be conducted to test the effectiveness of different proposed security measures such as security vulnerabilities, cyber-hardening of the architecture, and logging. This research will then use qualitative and quantitative metrics, such as a pass or fail test, self-healing time of containers, and the number of vulnerable access points to determine the effectiveness of each of these measures.

Share

COinS
 
Aug 5th, 10:15 AM

Secure Cloud Architecture for Protecting the Software of Space Vehicles

Utah State University, Logan, UT

As the number of space vehicles launched into outer space increases over time, the need to determine and counter possible cyber attacks from malicious agents will drastically increase. A potential solution to this problem is to create a cloud architecture that a spacecraft can use for autonomous detection or recovery from cyber attacks when out range of a ground station. For this work, the development of a new cloud architecture for space vehicles is proposed which allows users to control access to information or applications within the system while using the self-healing capabilities of containers. The cloud architecture will first be tested without the use of any containerization to establish a control. Afterwards, experiments will be conducted to test the effectiveness of different proposed security measures such as security vulnerabilities, cyber-hardening of the architecture, and logging. This research will then use qualitative and quantitative metrics, such as a pass or fail test, self-healing time of containers, and the number of vulnerable access points to determine the effectiveness of each of these measures.