skip to main content
10.1145/1244002.1244327acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Towards security monitoring patterns

Published:11 March 2007Publication History

ABSTRACT

Runtime monitoring is performed during system execution to detect whether the system's behaviour deviates from that described by requirements. To support this activity we have developed a monitoring framework that expresses the requirements to be monitored in event calculus - a formal temporal first order language. Following an investigation of how this framework could be used to monitor security requirements, in this paper we propose patterns for expressing three basic types of such requirements, namely confidentiality, integrity and availability. These patterns aim to ease the task of specifying confidentiality, integrity and availability requirements in monitorable forms by non-expert users. The paper illustrates the use of these patterns using examples of an industrial case study.

References

  1. Specification patterns, http://patterns.projects.cis.ksu.edu/Google ScholarGoogle Scholar
  2. Alur, R.: Techniques for Automatic Verification of Real- Time Systems. PhD thesis, Stanford Univ., August (1991) Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Avizienis A., Laprie J-C., Randell B.: Fundamental Concepts of Dependability. Report N01145, LAAS-CNRS, (2001)Google ScholarGoogle Scholar
  4. Campadello S. et al.: S&D Requirements specification, Deliverable A7.D2.1, SERENITY Project, /www.serenityforum.org/-Activities-.html?debut_article=4, (2006).Google ScholarGoogle Scholar
  5. Chen, L. and Avizienis A.: *N-version Programming: A Fault-Tolerance Approach To Reliability Of Software Operation, Proc. Of 25th Inter. Symp. on Fault-Tolerant Computing, 'Highlights from Twenty-Five Years', vol. III:113--119, 1995.Google ScholarGoogle Scholar
  6. Clarke, E. M., Emerson, E. A., and Sistla, A. P.: Automatic Verification of Finite-State Concurrent Systems Using Temporal Logic Specifications. ACM Trans. on Programming Languages and Systems, 8(2):244--263 (1986) Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Corbett, C., Dwyer, M. B., Hatcliff, and Robby: A language framework for expressing checkable properties of dynamic software. Proc. of the SPIN Software Model Checking Workshop, LNCS vol. 1885, (2000) Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Damianou N, Dulay N, Lupu E, Sloman M.: The Ponder Policy Specification Language, POLICY 2001, (2001) Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Denning, D.: An Intrusion-Detection Model, IEEE Trans. on Software Engineering, 13(2):222--232. (1987) Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Dwyer, M. B., Avrunin, G. S. and Corbett, J. C.: Property Specification Patterns for Finite state Verification. Proc. Of 2nd Work. on Formal Methods in Software Practice, (1998) Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. English, C., Terzis, S., Nixon, P.: Towards Self-Protecting Ubiquitous Systems Monitoring Trust-based Interactions, Proc. of UbiSys '04, (2004)Google ScholarGoogle Scholar
  12. Fernandez, E. B., and Pan, R.: A pattern language for security models. Technical report, Florida Atlantic University, published in PLoP (2001)Google ScholarGoogle Scholar
  13. Flake, S., and Mueller, W.: An OCL Extension for Real-Time Constraints. Advances in Object Modelling with the OCL, LNCS. Springer-Verlag, (2001) Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Jürjens, J.: Transformations for introducing patterns - a secure systems case study. In Work. on Transformations in UML, ETAPS 2001 Satellite Event, (2001)Google ScholarGoogle Scholar
  15. Jurjens, J.: UMLsec: Extending UML for secure systems development. Proc. of the 5th Int. Conf. on the Unified Modeling Language, LNCS, 2460: 412--425, (2002) Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Ko, C., Ruschitzka, M. & Levitt, K.: Execution monitoring of security-critical programs in distributed systems: A specification-based approach. Proc. of the IEEE Symposium on Security and Privacy, 175--187, (1997) Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Konrad, S. and Cheng, B. H: Real-time specification patterns. Proc of the 27th Int. Conf. on Soft. Engineering, 372--381 (2005) Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Koymans, R:. Specifying Real-Time Properties with Metric Temporal Logic. RealTime Systems, 2(4):255--299, 1990 Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Lodderstedt, T., Basin, D. A., and Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. Proc. of the 5th Int. Conf. on the Unified Modeling Language LNCS, vol. 2460: 426--441, Springer-Verlag, (2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Manna, Z., Pnueli, A.: The Temporal Logic of Reactive and Concurrent Systems. Springer-Verlag (1992) Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Moser, L. E., Ramakrishna, Y. S., Kutty, G., Melliar-Smith, P. M., and Dillon, K.: A Graphical Environment for the Design of Concurrent Real-Time Systems, ACM Trans. on Software Engineering Methodology, 6: 31--79, (1997) Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Porras, P. A. and Neumann, P. G.: EMERALD: Event monitoring enabling responses to anomalous live disturbances, In Proc. 20th National Information Systems Security Conference, 353--365. (1997)Google ScholarGoogle Scholar
  23. Security Patterns, http://www.securitypatterns.orgGoogle ScholarGoogle Scholar
  24. Shanahan, M. P.: The Event Calculus Explained, in Artificial Intelligence Today, LNAI no. 1600:409--430, Springer (1999)Google ScholarGoogle Scholar
  25. Smith, R. L., Avrunin, G. S., Clarke, L. A. and Osterweil, L. J.: Propel: An approach supporting property elucidation. In Proc. of the 24th Int. Conf. on Software Engineering, 11--21, May (2002) Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Spanoudakis, G. and Mahbub, K.: Non Intrusive Monitoring of Service Based Systems, Int. Journal of Cooperative Information Systems, 15(3): 325--358, (2006)Google ScholarGoogle ScholarCross RefCross Ref
  27. Srivatsa, M. and Liu, L.: Securing Publish-Subscribe Overlay Services with EventGuard, Proc. of the 12th ACM Conf on Computer and Communications Security, 289--298, (2005) Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards security monitoring patterns

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SAC '07: Proceedings of the 2007 ACM symposium on Applied computing
          March 2007
          1688 pages
          ISBN:1595934804
          DOI:10.1145/1244002

          Copyright © 2007 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 11 March 2007

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate1,650of6,669submissions,25%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader