Threats Management Throughout the Software Service Life-Cycle

被引:1
作者
Gjaere, Erlend Andreas [1 ]
Meland, Per Hakon [1 ]
机构
[1] SINTEF ICT, Trondheim, Norway
关键词
D O I
10.4204/EPTCS.148.1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventivemeasures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE) to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN) and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM) domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 17 条
[1]  
Aniketos project, 2013, TECHNICAL REPORT
[2]  
Brucker AD, 2013, LECT NOTES BUS INF P, V132, P662
[3]   A Framework for Secure Service Composition [J].
Brucker, Achim D. ;
Malmignati, Francesco ;
Merabti, Madjid ;
Shi, Qi ;
Zhou, Bo .
2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, :647-652
[4]  
Meland Per Hakon, 2013, 2013 International Conference on Availability, Reliability and Security (ARES), P428, DOI 10.1109/ARES.2013.57
[5]   Representing Threats in BPMN 2.0 [J].
Meland, Per Hakon ;
Gjaere, Erlend Andreas .
2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, :542-550
[6]   An architectural foundation for security model sharing and reuse [J].
Meland, Per Hakon ;
Ardi, Shanai ;
Jensen, Jostein ;
Rios, Erkuden ;
Sanchez, Txus ;
Shahmehri, Nahid ;
Tondel, Inger Anne .
2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, :823-+
[7]  
Oladimeji E.A., 2006, SECURITY THREAT MODE
[8]  
OMG, 2011, BUSINESS PROCESS MOD
[9]  
Paja Elda, 2012, Advances in Conceptual Modeling. Proceedings ER 2012 Workshops: CMS, ECDM-NoCoDA, MoDIC, MORE-BI, RIGiM, SeCoGIS, WISM, P396, DOI 10.1007/978-3-642-33999-8_48
[10]  
Paja E, 2013, LECT NOTES COMPUT SC, V8217, P504, DOI 10.1007/978-3-642-41924-9_45