2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE) 2020
DOI: 10.1109/wetice49692.2020.00013
|View full text |Cite
|
Sign up to set email alerts
|

Immunizer: A Scalable Loosely-Coupled Self-Protecting Software Framework using Adaptive Microagents and Parallelized Microservices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…The security of the cloud-based system depends critically on intrusion detection and response. To foster autonomy and deep security, Iraqi et al [ 50 ] proposed the Immunizer framework, which uses distributed cluster computing, parallelism, and asynchronous data streaming for monitoring, unsupervised learning for intrusion detection, as well as heuristic-based attack signature generation and intrusion prevention. As a safeguard against potential network attacks, a cost-sensitive adaptive intrusion response system for microservices was proposed by Yarygina et al [ 53 ], which employs a game-theoretic method to respond to network intrusions in real-time automatically.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The security of the cloud-based system depends critically on intrusion detection and response. To foster autonomy and deep security, Iraqi et al [ 50 ] proposed the Immunizer framework, which uses distributed cluster computing, parallelism, and asynchronous data streaming for monitoring, unsupervised learning for intrusion detection, as well as heuristic-based attack signature generation and intrusion prevention. As a safeguard against potential network attacks, a cost-sensitive adaptive intrusion response system for microservices was proposed by Yarygina et al [ 53 ], which employs a game-theoretic method to respond to network intrusions in real-time automatically.…”
Section: Resultsmentioning
confidence: 99%
“…The usage of machine learning mainly focuses on the identification of abnormal behavior to determine a system’s resilience to attacks and failures. Iraqi et al [ 50 ] presented a framework that utilizes autonomic computing and a microagent/microservice architecture approach, and it expands their application-level unsupervised outlier-based intrusion detection and prevention framework. Parallelism, asynchronous data streaming, and distributed cluster computing are also utilized.…”
Section: Resultsmentioning
confidence: 99%
“…This involves both the security of the managing and the managed system in addition to their interactions. While the security of a managed system has been studied in multiple domains [1,67,89,122,166,171,178,278], to the best of our knowledge, there has been no research that analyzes the security of the managing system or the adaptation mechanisms associated with the adaptation process. Security analysis of the adaptation process is critical, since self-adaptive systems are additionally vulnerable to classes of attacks that exploit the adapting or evolving nature of a system.…”
Section: Discussionmentioning
confidence: 99%
“…These attacks exploit information exposed in one state of the system to compromise a later state that can be reached during or after adaptation. Moreover, risk identification and analysis is often performed at design time [122,227]. Runtime security analysis is required to cope with systems that adapt often and exhibit dynamic behavior.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation