2019
DOI: 10.1007/978-3-030-17985-4_7
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Security Based on MAPE-K: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 27 publications
0
4
0
1
Order By: Relevance
“…An analysis with only Fuzzy approach researched by Alali et al [12] to identify the components of cyber risk, it then supported by MAPE-K approach on separate occasion [13]. Therefore, in this research, the Monitor, Analyze, Plan, Execute and Knowledge Base (MAPE-K) equipped with self-properties, which is the combination of Fuzzy and Q-Learning interacting with the assigned components iteratively within the loops [11].…”
Section: Evaluation VII Validationmentioning
confidence: 93%
“…An analysis with only Fuzzy approach researched by Alali et al [12] to identify the components of cyber risk, it then supported by MAPE-K approach on separate occasion [13]. Therefore, in this research, the Monitor, Analyze, Plan, Execute and Knowledge Base (MAPE-K) equipped with self-properties, which is the combination of Fuzzy and Q-Learning interacting with the assigned components iteratively within the loops [11].…”
Section: Evaluation VII Validationmentioning
confidence: 93%
“…Monitor (step 1) is the first module that collects data about the environment and the managed resources, such as status, metrics, configuration settings, etc. Furthermore, the monitor compiles the data to identify symptoms/signs and sends these symptoms/signs to the Analyze module for further processing (Lara et al 2019). The analyze module (step 2) includes the mechanism for analyzing and reasoning the data sent by the Monitor.…”
Section: Self-adaptive Model Identificationmentioning
confidence: 99%
“…Moreover, the analysis module determines whether there is a need for adaptation. Analyze may use prediction frameworks or models (Lara et al 2019) for data analysis. If there is a need for adaptation, it sends a request to the Plan module.…”
Section: Self-adaptive Model Identificationmentioning
confidence: 99%
See 1 more Smart Citation
“…Un enfoque que se ha propuesto en los últimos años para hacer frente a esta heterogeneidad, incertidumbre y dinamismo es el adaptativo, capaz de ajustar controles de seguridad aplicados al contexto y estado del activo, y al riesgo que estos factores implican en un momento dado [1], [2]. Se suele trabajar con modelos que modifiquen de forma autónoma el diseño, despliegue, configuración o modo de uso de los controles, tomando estas decisiones de adaptación con diferentes criterios y estrategias.…”
Section: Introducci óNunclassified