Sustainable Adaptive Security

06/05/2023
by   Liliana Pasquale, et al.
0

With software systems permeating our lives, we are entitled to expect that such systems are secure by design, and that such security endures throughout the use of these systems and their subsequent evolution. Although adaptive security systems have been proposed to continuously protect assets from harm, they can only mitigate threats arising from changes foreseen at design time. In this paper, we propose the notion of Sustainable Adaptive Security (SAS) which reflects such enduring protection by augmenting adaptive security systems with the capability of mitigating newly discovered threats. To achieve this objective, a SAS system should be designed by combining automation (e.g., to discover and mitigate security threats) and human intervention (e.g., to resolve uncertainties during threat discovery and mitigation). In this paper, we use a smart home example to showcase how we can engineer the activities of the MAPE (Monitor, Analysis, Planning, and Execution) loop of systems satisfying sustainable adaptive security. We suggest that using anomaly detection together with abductive reasoning can help discover new threats and guide the evolution of security requirements and controls. We also exemplify situations when humans can be involved in the execution of the activities of the MAPE loop and discuss the requirements to engineer human interventions.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/06/2021

A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case

Despite the surging development and utilization of IoT devices, the secu...
research
12/06/2018

Trustworthy Smart Band: Security Requirement Analysis with Threat Modeling

As smart bands make life more convenient and provide a positive lifestyl...
research
01/24/2014

Using Neural Network to Propose Solutions to Threats in Attack Patterns

In the last decade, a lot of effort has been put into securing software ...
research
05/08/2014

A Self-Adaptive Network Protection System

In this treatise we aim to build a hybrid network automated (self-adapti...
research
08/06/2018

Cross-App Threats in Smart Homes: Categorization, Detection and Handling

A number of Internet of Things (IoTs) platforms have emerged to enable v...
research
06/23/2018

A Recursive PLS (Partial Least Squares) based Approach for Enterprise Threat Management

Most of the existing solutions to enterprise threat management are preve...
research
08/30/2021

On the Unimportance of Superintelligence

Humankind faces many existential threats, but has limited resources to m...

Please sign up or login with your details

Forgot password? Click here to reset