Architecture-based Self-protection: Composing and Reasoning About Denial-of-service Mitigations
Title | Architecture-based Self-protection: Composing and Reasoning About Denial-of-service Mitigations |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Schmerl, Bradley, Cámara, Javier, Gennari, Jeffrey, Garlan, David, Casanova, Paulo, Moreno, Gabriel A., Glazier, Thomas J., Barnes, Jeffrey M. |
Conference Name | Proceedings of the 2014 Symposium and Bootcamp on the Science of Security |
Publisher | ACM |
Conference Location | Raleigh, NC, USA |
ISBN Number | 978-1-4503-2907-1 |
Keywords | ACM CCS, Architectures, CPS Technologies, cyber security, denial-of-service, Formal Methods and Theory of Security, Formal Security Models, Foundations, Hardware Security Implementation, Hardware-Based Security Protocols, Logic and Verification, Modeling, probabilistic model checking, science of security, Security in Hardware, self-adaptation, Validation and Verification |
Abstract | Security features are often hardwired into software applications, making it difficult to adapt security responses to reflect changes in runtime context and new attacks. In prior work, we proposed the idea of architecture-based self-protection as a way of separating adaptation logic from application logic and providing a global perspective for reasoning about security adaptations in the context of other business goals. In this paper, we present an approach, based on this idea, for combating denial-of-service (DoS) attacks. Our approach allows DoS-related tactics to be composed into more sophisticated mitigation strategies that encapsulate possible responses to a security problem. Then, utility-based reasoning can be used to consider different business contexts and qualities. We describe how this approach forms the underpinnings of a scientific approach to self-protection, allowing us to reason about how to make the best choice of mitigation at runtime. Moreover, we also show how formal analysis can be used to determine whether the mitigations cover the range of conditions the system is likely to encounter, and the effect of mitigations on other quality attributes of the system. We evaluate the approach using the Rainbow self-adaptive framework and show how Rainbow chooses DoS mitigation tactics that are sensitive to different business contexts. |
URL | http://doi.acm.org/10.1145/2600176.2600181 |
DOI | 10.1145/2600176.2600181 |
Citation Key | Schmerl:2014:ASC:2600176.2600181 |
- Architectures
- Architectures
- Modeling
- Science of Security
- Validation and Verification
- CPS Technologies
- Foundations
- Hardware Security Implementation
- validation and verification
- Self-Adaptation
- Security in Hardware
- Science of Security
- Probabilistic Model Checking
- modeling
- Logic and Verification
- Hardware-Based Security Protocols
- ACM CCS
- foundations
- Formal Security Models
- Formal Methods and Theory of Security
- Denial-of-Service
- cyber security
- CPS Technologies
- Architectures
- ACM CCS
- Hardware-Based Security Protocols
- Cyber Security
- Formal Security Models
- Formal Methods and Theory of Security
- Logic and Verification
- Hardware Security Implementation
- Security in Hardware