Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2642803.2642808acmotherconferencesArticle/Chapter ViewAbstractPublication PagesecsawConference Proceedingsconference-collections
research-article

Security Measuring for Self-adaptive Security

Published: 25 August 2014 Publication History
  • Get Citation Alerts
  • Abstract

    Self-adaptive security is needed due to vast amount of changes in an execution environment and threat landscape, which all cannot be anticipated at software design-time. Self-adaptive security requires means for monitoring a security level and decision making capability to improve the current security level. In this paper, we describe how security metrics are able to support self-adaptive security. The paper analyses benefits and challenges of security measuring from the self-adaptive security perspective. Thus, five benefits and three challenges of security metrics in self-adaptive security are described. Furthermore, the paper derives requirements that measuring causes for self-adaptive security. Based on the derived requirements, extension components for the MAPE (Monitor, Analyse, Plan and Execute) reference model are proposed.

    References

    [1]
    Evesti, A.; Ovaska, E. Comparison of Adaptive Information Security Approaches. ISRN Artificial Intelligence 2013, 1--18.
    [2]
    Yuan, E.; Malek, S. A taxonomy and survey of self-protecting software systems. In Proceedings of the Software Engineering for Adaptive and Self-Managing Systems, Zürich, Switzerland, 4-5 June, IEEE, 2012, pp. 109--118.
    [3]
    Yuan, E.; Esfahani, N.; Malek, S. A Systematic Survey of Self-Protecting Software Systems. ACM Trans.Auton.Adapt.Syst. 2014, 8, 17:1--17:41.
    [4]
    Abie, H.; Savola, R. M.; Bigham, J.; Dattani, I.; Rotondi, D.; Da Bormida, G. Self-Healing and Secure Adaptive Messaging Middleware for Business-Critical Systems. Int. J. on Advances in Security 2010, 3, 34--51.
    [5]
    Evesti, A.; Suomalainen, J.; Ovaska, E. Architecture and Knowledge-driven Self-adaptive Security in Smart Spaces. Computers 2013, 2, 34--66.
    [6]
    Salehie, M.; Tahvildari, L. Self-adaptive software: Landscape and research challenges. ACM Trans.Auton.Adapt.Syst. 2009, 4, 14:1--14:42.
    [7]
    García, F.; Bertoa, M. F.; Calero, C.; Vallecillo, A.; Ruíz, F.; Piattini, M.; Genero, M. Towards a consistent terminology for software measurement. Inf. and Softw. Technol. 2006, 48, 631--644.
    [8]
    Wang, C.; Wulf, W. A. Towards a Framework for Security Measurement. In Proceedings of the 20th National Information Systems Security Conference, Baltimore, Maryland, October, 1997, pp. 522--533.
    [9]
    Savola, R.; Abie, H. Development of measurable security for a distributed messaging system. Int. J. on Advances in Security 2009, 2, 358--380.
    [10]
    Kephart, J. O.; Chess, D. M. The vision of autonomic computing. Computer 2003, 36, 41--50.
    [11]
    Weiß, S.; Weissmann, O.; Dressler, F. A comprehensive and comparative metric for information security. In Proceedings of the ICTSM'05, 2005, pp. 1--10.
    [12]
    Jafari, S.; Mtenzi, F.; Fitzpatrick, R.; O'Shea, B. Security metrics for e-healthcare information systems: a domain specific metrics approach. Int.Journal of Digital Society 2010, 1, 238--245.
    [13]
    Abie, H.; Balasingham, I. Risk-based Adaptive Security for Smart IoT in eHealth. In Proceedings of the 7th International Conference on Body Area Networks, Oslo, Norway, September 24-26, ICST, 2012, pp. 269--275.
    [14]
    ISO/IEC 27001:2005. Information technology - Security techniques - Information security management systems-Requirements. Int. Organ.Stand. Int. Electrotech. Comm. 2005.
    [15]
    ISO/IEC 27004:2009 Information technology - Security techniques - Information security management -- Measurement. Int. Organ. Stand. Int. Electrotech 2009.
    [16]
    Savola, R. On the feasibility of utilizing security metrics in software-intensive systems. International Journal of Computer Science and Network Security 2010, 10, 230--239.
    [17]
    Savola, R. M. Quality of security metrics and measurements. Comput.Secur. 2013, 37, 78--90.

    Cited By

    View all
    • (2019)Specifying a New Requirement Model for Secure Adaptive SystemsThe Computer Journal10.1093/comjnl/bxz12463:8(1148-1167)Online publication date: 26-Dec-2019

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ECSAW '14: Proceedings of the 2014 European Conference on Software Architecture Workshops
    August 2014
    214 pages
    ISBN:9781450327787
    DOI:10.1145/2642803
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 August 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Self-adaptive
    2. architecture
    3. decision-making
    4. security metric

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ECSAW '14

    Acceptance Rates

    ECSAW '14 Paper Acceptance Rate 29 of 43 submissions, 67%;
    Overall Acceptance Rate 80 of 120 submissions, 67%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)6
    • Downloads (Last 6 weeks)0

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)Specifying a New Requirement Model for Secure Adaptive SystemsThe Computer Journal10.1093/comjnl/bxz12463:8(1148-1167)Online publication date: 26-Dec-2019

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media