Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1244002.1244327acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Towards security monitoring patterns

Published: 11 March 2007 Publication History

Abstract

Runtime monitoring is performed during system execution to detect whether the system's behaviour deviates from that described by requirements. To support this activity we have developed a monitoring framework that expresses the requirements to be monitored in event calculus - a formal temporal first order language. Following an investigation of how this framework could be used to monitor security requirements, in this paper we propose patterns for expressing three basic types of such requirements, namely confidentiality, integrity and availability. These patterns aim to ease the task of specifying confidentiality, integrity and availability requirements in monitorable forms by non-expert users. The paper illustrates the use of these patterns using examples of an industrial case study.

References

[1]
Specification patterns, http://patterns.projects.cis.ksu.edu/
[2]
Alur, R.: Techniques for Automatic Verification of Real- Time Systems. PhD thesis, Stanford Univ., August (1991)
[3]
Avizienis A., Laprie J-C., Randell B.: Fundamental Concepts of Dependability. Report N01145, LAAS-CNRS, (2001)
[4]
Campadello S. et al.: S&D Requirements specification, Deliverable A7.D2.1, SERENITY Project, /www.serenityforum.org/-Activities-.html?debut_article=4, (2006).
[5]
Chen, L. and Avizienis A.: *N-version Programming: A Fault-Tolerance Approach To Reliability Of Software Operation, Proc. Of 25th Inter. Symp. on Fault-Tolerant Computing, 'Highlights from Twenty-Five Years', vol. III:113--119, 1995.
[6]
Clarke, E. M., Emerson, E. A., and Sistla, A. P.: Automatic Verification of Finite-State Concurrent Systems Using Temporal Logic Specifications. ACM Trans. on Programming Languages and Systems, 8(2):244--263 (1986)
[7]
Corbett, C., Dwyer, M. B., Hatcliff, and Robby: A language framework for expressing checkable properties of dynamic software. Proc. of the SPIN Software Model Checking Workshop, LNCS vol. 1885, (2000)
[8]
Damianou N, Dulay N, Lupu E, Sloman M.: The Ponder Policy Specification Language, POLICY 2001, (2001)
[9]
Denning, D.: An Intrusion-Detection Model, IEEE Trans. on Software Engineering, 13(2):222--232. (1987)
[10]
Dwyer, M. B., Avrunin, G. S. and Corbett, J. C.: Property Specification Patterns for Finite state Verification. Proc. Of 2nd Work. on Formal Methods in Software Practice, (1998)
[11]
English, C., Terzis, S., Nixon, P.: Towards Self-Protecting Ubiquitous Systems Monitoring Trust-based Interactions, Proc. of UbiSys '04, (2004)
[12]
Fernandez, E. B., and Pan, R.: A pattern language for security models. Technical report, Florida Atlantic University, published in PLoP (2001)
[13]
Flake, S., and Mueller, W.: An OCL Extension for Real-Time Constraints. Advances in Object Modelling with the OCL, LNCS. Springer-Verlag, (2001)
[14]
Jürjens, J.: Transformations for introducing patterns - a secure systems case study. In Work. on Transformations in UML, ETAPS 2001 Satellite Event, (2001)
[15]
Jurjens, J.: UMLsec: Extending UML for secure systems development. Proc. of the 5th Int. Conf. on the Unified Modeling Language, LNCS, 2460: 412--425, (2002)
[16]
Ko, C., Ruschitzka, M. & Levitt, K.: Execution monitoring of security-critical programs in distributed systems: A specification-based approach. Proc. of the IEEE Symposium on Security and Privacy, 175--187, (1997)
[17]
Konrad, S. and Cheng, B. H: Real-time specification patterns. Proc of the 27th Int. Conf. on Soft. Engineering, 372--381 (2005)
[18]
Koymans, R:. Specifying Real-Time Properties with Metric Temporal Logic. RealTime Systems, 2(4):255--299, 1990
[19]
Lodderstedt, T., Basin, D. A., and Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. Proc. of the 5th Int. Conf. on the Unified Modeling Language LNCS, vol. 2460: 426--441, Springer-Verlag, (2002).
[20]
Manna, Z., Pnueli, A.: The Temporal Logic of Reactive and Concurrent Systems. Springer-Verlag (1992)
[21]
Moser, L. E., Ramakrishna, Y. S., Kutty, G., Melliar-Smith, P. M., and Dillon, K.: A Graphical Environment for the Design of Concurrent Real-Time Systems, ACM Trans. on Software Engineering Methodology, 6: 31--79, (1997)
[22]
Porras, P. A. and Neumann, P. G.: EMERALD: Event monitoring enabling responses to anomalous live disturbances, In Proc. 20th National Information Systems Security Conference, 353--365. (1997)
[23]
Security Patterns, http://www.securitypatterns.org
[24]
Shanahan, M. P.: The Event Calculus Explained, in Artificial Intelligence Today, LNAI no. 1600:409--430, Springer (1999)
[25]
Smith, R. L., Avrunin, G. S., Clarke, L. A. and Osterweil, L. J.: Propel: An approach supporting property elucidation. In Proc. of the 24th Int. Conf. on Software Engineering, 11--21, May (2002)
[26]
Spanoudakis, G. and Mahbub, K.: Non Intrusive Monitoring of Service Based Systems, Int. Journal of Cooperative Information Systems, 15(3): 325--358, (2006)
[27]
Srivatsa, M. and Liu, L.: Securing Publish-Subscribe Overlay Services with EventGuard, Proc. of the 12th ACM Conf on Computer and Communications Security, 289--298, (2005)

Cited By

View all
  • (2024)Compositional Security Analysis of Dynamic Component-based SystemsProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695499(1232-1244)Online publication date: 27-Oct-2024
  • (2023)Mission Specification Patterns for Mobile Robots: Providing Support for Quantitative PropertiesIEEE Transactions on Software Engineering10.1109/TSE.2022.323005949:4(2741-2760)Online publication date: 1-Apr-2023
  • (2023)Configurable Model-Based Test Generation for Distributed Controllers Using Declarative Model Queries and Model CheckersFormal Methods for Industrial Critical Systems10.1007/978-3-031-43681-9_5(76-95)Online publication date: 17-Sep-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '07: Proceedings of the 2007 ACM symposium on Applied computing
March 2007
1688 pages
ISBN:1595934804
DOI:10.1145/1244002
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 March 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. event calculus
  2. runtime monitoring
  3. security patterns

Qualifiers

  • Article

Conference

SAC07
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)1
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Compositional Security Analysis of Dynamic Component-based SystemsProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695499(1232-1244)Online publication date: 27-Oct-2024
  • (2023)Mission Specification Patterns for Mobile Robots: Providing Support for Quantitative PropertiesIEEE Transactions on Software Engineering10.1109/TSE.2022.323005949:4(2741-2760)Online publication date: 1-Apr-2023
  • (2023)Configurable Model-Based Test Generation for Distributed Controllers Using Declarative Model Queries and Model CheckersFormal Methods for Industrial Critical Systems10.1007/978-3-031-43681-9_5(76-95)Online publication date: 17-Sep-2023
  • (2021)Specification Patterns for Robotic MissionsIEEE Transactions on Software Engineering10.1109/TSE.2019.294532947:10(2208-2224)Online publication date: 1-Oct-2021
  • (2021)Argumentation and explainable artificial intelligence: a surveyThe Knowledge Engineering Review10.1017/S026988892100001136Online publication date: 5-Apr-2021
  • (2020)A Benchmark of Security Metrics in Cyber-Physical Systems2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)10.1109/SECONWorkshops50264.2020.9149779(1-6)Online publication date: Jun-2020
  • (2019)A multilevel cybersecurity and safety monitor for embedded cyber-physical systemsProceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems10.1145/3302509.3313321(320-321)Online publication date: 16-Apr-2019
  • (2018)A Novel Runtime Verification Solution for IoT SystemsIEEE Access10.1109/ACCESS.2018.28138876(13501-13512)Online publication date: 2018
  • (2015)Aligning Qualitative, Real-Time, and Probabilistic Property Specification Patterns Using a Structured English GrammarIEEE Transactions on Software Engineering10.1109/TSE.2015.239887741:7(620-638)Online publication date: 1-Jul-2015
  • (2015)Improving Tenants' Trust in SaaS Applications Using Dynamic Security MonitorsProceedings of the 2015 20th International Conference on Engineering of Complex Computer Systems (ICECCS)10.1109/ICECCS.2015.18(70-79)Online publication date: 9-Dec-2015
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media