A Systematic Survey of Self-Protecting Software Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Hi-index | 0.00 |
Providing an uninterruptable self-protection mechanism that is totally integrated into and inseparable from the computing system that is being protected ensures a complete, affordable, and assured compliance with system security audits. This paper presents the Insider Threat Security Architecture (ITSA) and describes its various components. It presents a security scenario where privileged users can compromise the system that they protect and how that same scenario can be mitigated under the ITSA framework. It also describes the foundational premise that this framework is built upon. It draws the distinction between the proposed approach and the traditional most common approach to providing system protection. It emphasizes the unquestionable importance of making the self-protection mechanism as an integral part of the core components of the system that is being protected.