A Pattern-Driven Framework for Monitoring Security and Dependability

  • Christos Kloukinas
  • George Spanoudakis
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4657)

Abstract

In this paper we describe a framework that supports the dynamic configuration, adaptation and monitoring of systems that need to guarantee specific security and dependability (S&D) properties whilst operating in distributed settings. The framework is based on patterns providing abstract specifications of implementation solutions that can be used by systems in order to achieve specific S&D properties. The focus herein will be on the monitoring aspects of the framework which allow it to adapt to violations of the S&D requirements and changes to the current context.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Maña, A., et al.: Security engineering for ambient intelligence: A manifesto. In: Integrating Security and Software Engineering: Advances and Future Vision, pp. 244–270. Idea Group Publishing (2006)Google Scholar
  2. 2.
    Sanchez-Cid, F., et al.: Software engineering techniques applied to AmI: Security patterns. In: Developing Ambient Intelligence: Proc. of the First Int. Conf. on Ambient Intelligence Developments (AmID 2006), Sophia-Antipolis, France, Springer, Heidelberg (2006)Google Scholar
  3. 3.
    Campadello, S., et al.: S&D requirements specification. Deliverable A7.D2.1, SERENITY Project (2006), Available from http://www.serenity-forum.org
  4. 4.
    Maña, A., et al.: Patterns and integration schemes languages. Deliverable A5.D2.1, SERENITY Project (2006), Available from http://www.serenity-forum.org
  5. 5.
    Shanahan, M.P.: The event calculus explained. In: Veloso, M.M., Wooldridge, M.J. (eds.) Artificial Intelligence Today. LNCS (LNAI), vol. 1600, pp. 409–430. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  6. 6.
    Melton, R., Garlan, D.: Architectural Unification. In: Proceedings of CASCON 1997, Ontario, Canada (1997)Google Scholar
  7. 7.
    Spanoudakis, G., Mahbub, K.: Non intrusive monitoring of service based systems. International Journal of Cooperative Information Systems 15, 325–358 (2006)CrossRefGoogle Scholar
  8. 8.
    Axelsson, S.: Intrusion detection systems: A survey and taxonomy. Technical Report 99-15, Dept. of Computer Engineering, Chalmers Univ. (2000)Google Scholar
  9. 9.
    Hofmeyr, S.A., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation 7, 1289–1296 (2000)Google Scholar
  10. 10.
    Anagnostakis, K., et al.: Detecting targeted attacks using shadow honeypots. In: Proc. of the 14t h USENIX Security Symposium (2005)Google Scholar
  11. 11.
    Labbe, K., et al.: A methodology for evaluation of host-based intrusion prevention systems and its application. In: Proc. of the 7th IEEE Work. on Information Assurance (2006)Google Scholar
  12. 12.
    Corradi, A., et al.: Context-based access control management in ubiquitous environments. In: Third IEEE Int. Symp. on Network Computing and Applications, pp. 253–260. IEEE Computer Society Press, Los Alamitos (2004)CrossRefGoogle Scholar
  13. 13.
    Hulsebosch, J., et al.: Context sensitive access control. In: Proc. of the Tenth ACM Symp. on Access Control Models and Technologies, SACMAT 2005, pp. 111–119. ACM Press, New York (2005)CrossRefGoogle Scholar
  14. 14.
    Robinson, W.: Monitoring software requirements using instrumented code. In: Proc. of the Hawaii Int. Conf. on Systems Sciences, 2002, Hawaii, USA (2002)Google Scholar
  15. 15.
    Feather, M., et al.: Reconciling system requirements and runtime behaviour. In: Proc. of 9th Int. Work. on Software Specification & Design (1998)Google Scholar
  16. 16.
    Kannan, S., et al.: Runtime monitoring and steering based on formal specifications. In: Workshop on Modeling Software System Structures in a Fastly Moving Scenario (2000)Google Scholar
  17. 17.
    Kim, M., et al.: Java-MaC: a runtime assurance tool for Java programs. Electr. Notes in Theoretical Computer Science, 55 (2001)Google Scholar
  18. 18.
    Spanoudakis, G., Kloukinas, C., Androutsopoulos, K.: Towards security monitoring patterns. In: ACM Symposium on Applied Computing (SAC07) - Track on Software Verification, Seoul, Korea, vol. 2, pp. 1518–1525. ACM, New York (2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Christos Kloukinas
    • 1
  • George Spanoudakis
    • 1
  1. 1.Department of Computing, The City University, London, EC1V 0HBU.K.

Personalised recommendations