2020 10th Annual Computing and Communication Workshop and Conference (CCWC) 2020
DOI: 10.1109/ccwc47524.2020.9031205
|View full text |Cite
|
Sign up to set email alerts
|

A Decentralized Approach to Architecture-Based Self-Protecting Software Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…MTD prevents network attacks by dynamically changing the attack surface of the system such as the static configuration of the network, thereby invalidating the intelligence collected by the attacker and depleting their device resources. According to its mechanism of defense, MTD can be divided into three categories [ 6 ]: shuffling-based MTD [ 7 , 8 , 9 ], diversity-based MTD [ 10 , 11 , 12 ] and redundancy-based MTD [ 13 , 14 ]. The shuffling- based MTD on is the most common one, which protects networks from attack by rearranging or randomizing the key parameters or information of the system, for example, IP shuffling, port hopping, or randomizing packet headers.…”
Section: Related Workmentioning
confidence: 99%
“…MTD prevents network attacks by dynamically changing the attack surface of the system such as the static configuration of the network, thereby invalidating the intelligence collected by the attacker and depleting their device resources. According to its mechanism of defense, MTD can be divided into three categories [ 6 ]: shuffling-based MTD [ 7 , 8 , 9 ], diversity-based MTD [ 10 , 11 , 12 ] and redundancy-based MTD [ 13 , 14 ]. The shuffling- based MTD on is the most common one, which protects networks from attack by rearranging or randomizing the key parameters or information of the system, for example, IP shuffling, port hopping, or randomizing packet headers.…”
Section: Related Workmentioning
confidence: 99%
“…P-III refers to enhancing security-aware adaptation with countermeasure selection. Countermeasure selection and deployment approaches have been proposed before, however, these approaches often are limited in either the kind of countermeasures that can be applied [94,204,227] or in the types of systems that they can protect. To the best of our knowledge, we lack a solution that follows a holistic approach taking into account the possible component and countermeasure configurations available to protect a software system, analyzes their effects, compatibility and costs, and identifies the best available configuration to be deployed.…”
Section: Discussionmentioning
confidence: 99%
“…The third step is a runtime step where the mobile application is monitored for possible threats and when a threat is detected, mitigations are recommended. Porter et al [204] propose a decentralized approach for architecture-based self-protection that distributes architecture-recovery capabilities over multiple system components. Software component rejuvenation is employed to restore the compromised components to a previously identified operational state.…”
Section: Self-protecting Systemsmentioning
confidence: 99%