Monitoring Threats To Composite Services Within The Aniketos Run-Time Framework

SECURE AND TRUSTWORTHY SERVICE COMPOSITION: THE ANIKETOS APPROACH(2014)

引用 0|浏览4
暂无评分
摘要
Creating complex systems by combining service components is becoming a fundamental way to create flexible IT solutions that can react to changing environment and comply with agile business. The dynamic nature of the Future Internet introduces new threats, and with wider deployment comes a greater need to identify and tackle these threats before they become attacks. For a composite service, this is even more challenging, since each individual service component will have a fluctuating threat picture and there is a broad combined attack surface when many service components are involved. In this chapter we present the design and implementation of the Aniketos Service Threat Monitoring Module. This approach applies runtime monitoring of a service that collects change events that occur and determines their impact on service compositions.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要