adaptive security
Recently Published Documents


TOTAL DOCUMENTS

248
(FIVE YEARS 56)

H-INDEX

19
(FIVE YEARS 3)

2022 ◽  
Vol 31 (1) ◽  
pp. 1-52
Author(s):  
Irum Rauf ◽  
Marian Petre ◽  
Thein Tun ◽  
Tamara Lopez ◽  
Paul Lunn ◽  
...  

Despite the availability of various methods and tools to facilitate secure coding, developers continue to write code that contains common vulnerabilities. It is important to understand why technological advances do not sufficiently facilitate developers in writing secure code. To widen our understanding of developers' behaviour, we considered the complexity of the security decision space of developers using theory from cognitive and social psychology. Our interdisciplinary study reported in this article (1) draws on the psychology literature to provide conceptual underpinnings for three categories of impediments to achieving security goals, (2) reports on an in-depth meta-analysis of existing software security literature that identified a catalogue of factors that influence developers' security decisions, and (3) characterises the landscape of existing security interventions that are available to the developer during coding and identifies gaps. Collectively, these show that different forms of impediments to achieving security goals arise from different contributing factors. Interventions will be more effective where they reflect psychological factors more sensitively and marry technical sophistication, psychological frameworks, and usability. Our analysis suggests “adaptive security interventions” as a solution that responds to the changing security needs of individual developers and a present a proof-of-concept tool to substantiate our suggestion.


2022 ◽  
pp. 102612
Author(s):  
Miguel Calvo ◽  
Marta Beltrán

Sensors ◽  
2021 ◽  
Vol 22 (1) ◽  
pp. 238
Author(s):  
Christos Grigoriadis ◽  
Romain Laborde ◽  
Antonin Verdier ◽  
Panayiotis Kotzanikolaou

Maritime processes involve actors and systems that continuously change their underlying environment, location and threat exposure. Thus, risk mitigation requires a dynamic risk assessment process, coupled with an adaptive, event driven security enforcement mechanism, to efficiently deal with dynamically evolving risks in a cost efficient manner. In this paper, we propose an adaptive security framework that covers both situational risk assessment and situational driven security policy deployment. We extend MITIGATE, a maritime-specific risk assessment methodology, to capture situations in the risk assessment process and thus produce fine-grained and situation-specific, dynamic risk estimations. Then, we integrate DynSMAUG, a situation-driven security management system, to enforce adaptive security policies that dynamically implement security controls specific to each situation. To validate the proposed framework, we test it based on maritime cargo transfer service. We utilize various maritime specific and generic systems employed during cargo transfer, to produce dynamic risks for various situations. Our results show that the proposed framework can effectively assess dynamic risks per situation and automate the enforcement of adaptive security controls per situation. This is an important improvement in contrast to static and situation-agnostic risk assessment frameworks, where security controls always default to worst-case risks, with a consequent impact on the cost and the applicability of proper security controls.


Author(s):  
Shishir Kumar Shandilya

In recent years, the cyber security scenario has transformed predominantly from conventional response-based security mechanisms to proactive security strategies. And this transformation is still continuing which is shifting it from proactive security strategies to cyber immunity which eliminates the cyber threats by introducing stringent and adaptive security measures. In the process of developing new security algorithms/procedures, accurate modelling and effective simulation play a vital role for the robustness and effectiveness of proposed system. It is also necessary to analyze the behaviour of proposed system against multiple types of known cyber attacks. This paper focuses on the existing network testbeds for an effective analysis and monitoring while proposing a new network testbed for examining new security concepts like cyber immunity. The proposed network testbed is designed to incorporate the methods and procedures of Nature-inspired Cyber Security to accommodate the adaptive responses against the sophisticated and ever-advancing cyber attacks. The proposed testbed provides customizable analytical tool to design, test and examine the new security algorithms through a rich set of attack scenarios. It also allows developers to design, implement, and evaluate their defensive techniques with library support.


2021 ◽  
pp. 103575
Author(s):  
Yan Chen ◽  
Xin (Robert) Luo ◽  
Han Li

2021 ◽  
pp. 643-651
Author(s):  
Lijing Yan ◽  
Feng Gao ◽  
Yifan Song ◽  
Huichao Liang

2021 ◽  
Author(s):  
Irish Singh ◽  
Seok-Won Lee

Engineering ◽  
2021 ◽  
Author(s):  
Zimin Jiang ◽  
Zefan Tang ◽  
Peng Zhang ◽  
Yanyuan Qin

Sign in / Sign up

Export Citation Format

Share Document