DocumentCode :
155180
Title :
A Hybrid Monitoring of Software Design-Level Security Specifications
Author :
Khan, Muhammad Uzair ; Zulkernine, Mohammad
Author_Institution :
Sch. of Comput., Queen´s Univ., Kingston, ON, Canada
fYear :
2014
fDate :
2-3 Oct. 2014
Firstpage :
111
Lastpage :
116
Abstract :
The behavior of the deployed software should be monitored against its security specifications to identify vulnerabilities introduced due to incorrect implementation of secure design decisions. Security specifications, including design-level ones, impose constraints on the behavior of the software. These constraints can be broadly categorized as non-time-critical and time-critical and have to be monitored in a manner that minimizes the monitoring overhead. In this paper, we suggest using a hybrid of event and time monitoring techniques to observe these constraints. The viability of the hybrid technique is assessed by comparing its effectiveness and performance with event and time monitoring techniques. The results indicate that the hybrid monitoring technique is more effective and efficient when compared separately with event or time monitoring.
Keywords :
computerised monitoring; security of data; event monitoring techniques; hybrid monitoring technique; hybrid software design-level security specifications monitoring; monitoring overhead; secure design decisions; software behavior; time monitoring techniques; Authentication; Instruments; Monitoring; Software; Software algorithms; Time factors; design-level; monitoring; security specifications;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Quality Software (QSIC), 2014 14th International Conference on
Conference_Location :
Dallas, TX
ISSN :
1550-6002
Print_ISBN :
978-1-4799-7197-8
Type :
conf
DOI :
10.1109/QSIC.2014.14
Filename :
6958394
Link To Document :
بازگشت