Skip to main content

2018 | OriginalPaper | Buchkapitel

Design of a Secure Shield for Internet and Web-Based Services Using Software Reflection

verfasst von : Ana R. Cavalli, Antonio M. Ortiz, Georges Ouffoué, Cesar A. Sanchez, Fatiha Zaïdi

Erschienen in: Web Services – ICWS 2018

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper presents a new methodology using software reflection to prevent, detect, and mitigate internal attacks to a running Internet Web server. This methodology is very suitable to design such systems as secure by default, that is, when designing the software some parts are marked as secured, and any change/modification of these parts will be an unexpected behavior that needs to be analyzed. If these changes turn out to be attacks, then some remediation techniques are activated, in order to guarantee that the system will continue to work even in the presence of an attack. In addition of providing the methodology, we show how this technique has been used as the basis to develop a real information system. Our experiments are convincing and argue for a secure design to develop complex systems in order to facilitate their protection, and to help to prevent attacks and intrusions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Guerraoui, R., Schiper, A.: Software-based replication for fault tolerance. Computer 30(4), 68–74 (1997)CrossRef Guerraoui, R., Schiper, A.: Software-based replication for fault tolerance. Computer 30(4), 68–74 (1997)CrossRef
2.
Zurück zum Zitat Lamport, L., et al.: Paxos made simple. ACM Sigact News 32(4), 18–25 (2001) Lamport, L., et al.: Paxos made simple. ACM Sigact News 32(4), 18–25 (2001)
3.
Zurück zum Zitat Ahn, W.H., Park, S., Oh, J., Lim, S.H.: Inishing: a UI phishing attack to exploit the vulnerability of inotify in Android smartphones. IEICE Trans. Inf. Syst. 99(9), 2404–2409 (2016)CrossRef Ahn, W.H., Park, S., Oh, J., Lim, S.H.: Inishing: a UI phishing attack to exploit the vulnerability of inotify in Android smartphones. IEICE Trans. Inf. Syst. 99(9), 2404–2409 (2016)CrossRef
4.
Zurück zum Zitat Kirda, E.: UNVEIL: a large-scale, automated approach to detecting ransomware (keynote). In: 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering, SANER, p. 1. IEEE (2017) Kirda, E.: UNVEIL: a large-scale, automated approach to detecting ransomware (keynote). In: 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering, SANER, p. 1. IEEE (2017)
5.
Zurück zum Zitat Vinoski, S.: A time for reflection software reflection. IEEE Internet Comput. 9(1), 86–89 (2005)CrossRef Vinoski, S.: A time for reflection software reflection. IEEE Internet Comput. 9(1), 86–89 (2005)CrossRef
6.
Zurück zum Zitat Razavian, M., Tang, A., Capilla, R., Lago, P.: In two minds: how reflections influence software design thinking. J. Softw.: Evol. Process 28(6), 394–426 (2016) Razavian, M., Tang, A., Capilla, R., Lago, P.: In two minds: how reflections influence software design thinking. J. Softw.: Evol. Process 28(6), 394–426 (2016)
7.
Zurück zum Zitat Wehbi, B., de Oca, E.M., Bourdelles, M.: Events-based security monitoring using MMT tool. In: 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation, ICST, pp. 860–863. IEEE (2012) Wehbi, B., de Oca, E.M., Bourdelles, M.: Events-based security monitoring using MMT tool. In: 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation, ICST, pp. 860–863. IEEE (2012)
8.
Zurück zum Zitat Maes, P.: Concepts and experiments in computational reflection. In: SIGPLAN Notices, vol. 22, no. 12, pp. 147–155 (1987)CrossRef Maes, P.: Concepts and experiments in computational reflection. In: SIGPLAN Notices, vol. 22, no. 12, pp. 147–155 (1987)CrossRef
9.
Zurück zum Zitat Generowicz, J., Lavrijsen, W.T., Marino, M., Mato, P.: Reflection-based Python-C++ bindings. Lawrence Berkeley National Laboratory (2004) Generowicz, J., Lavrijsen, W.T., Marino, M., Mato, P.: Reflection-based Python-C++ bindings. Lawrence Berkeley National Laboratory (2004)
10.
Zurück zum Zitat Roiser, S., Mato, P.: The SEAL C++ reflection system (2005) Roiser, S., Mato, P.: The SEAL C++ reflection system (2005)
11.
Zurück zum Zitat Forman, R.R., Forman, N., Ibm, J.V.: Java reflection in action (2004) Forman, R.R., Forman, N., Ibm, J.V.: Java reflection in action (2004)
12.
Zurück zum Zitat Affonso, F.J., Nakagawa, E.Y.: A reference architecture based on reflection for self-adaptive software. In: 2013 VII Brazilian Symposium on Software Components, Architectures and Reuse, pp. 129–138 (2013) Affonso, F.J., Nakagawa, E.Y.: A reference architecture based on reflection for self-adaptive software. In: 2013 VII Brazilian Symposium on Software Components, Architectures and Reuse, pp. 129–138 (2013)
13.
Zurück zum Zitat Spinellis, D.: Reflection as a mechanism for software integrity verification. ACM Trans. Inf. Syst. Secur. 3(1), 51–62 (2000)CrossRef Spinellis, D.: Reflection as a mechanism for software integrity verification. ACM Trans. Inf. Syst. Secur. 3(1), 51–62 (2000)CrossRef
14.
Zurück zum Zitat Lei, Y.: There can be composite services when you believe. Int. J. Serv. Comput. (IJSC) 4(2), 49–58 (2016) Lei, Y.: There can be composite services when you believe. Int. J. Serv. Comput. (IJSC) 4(2), 49–58 (2016)
16.
Zurück zum Zitat Hurier, M., Allix, K., Bissyandé, T.F., Klein, J., Le Traon, Y.: On the lack of consensus in anti-virus decisions: metrics and insights on building ground truths of Android malware. In: Caballero, J., Zurutuza, U., Rodríguez, R.J. (eds.) DIMVA 2016. LNCS, vol. 9721, pp. 142–162. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-40667-1_8CrossRef Hurier, M., Allix, K., Bissyandé, T.F., Klein, J., Le Traon, Y.: On the lack of consensus in anti-virus decisions: metrics and insights on building ground truths of Android malware. In: Caballero, J., Zurutuza, U., Rodríguez, R.J. (eds.) DIMVA 2016. LNCS, vol. 9721, pp. 142–162. Springer, Cham (2016). https://​doi.​org/​10.​1007/​978-3-319-40667-1_​8CrossRef
18.
Zurück zum Zitat Madan, B.B., Trivedi, K.S.: Security modeling and quantification of intrusion tolerant systems using attack-response graph. J. High Speed Netw. 13(4), 297–308 (2004) Madan, B.B., Trivedi, K.S.: Security modeling and quantification of intrusion tolerant systems using attack-response graph. J. High Speed Netw. 13(4), 297–308 (2004)
19.
Zurück zum Zitat Nguyen, Q., Sood, A.: A comparison of intrusion-tolerant system architectures. IEEE Secur. Priv. 9(4), 24–31 (2010)CrossRef Nguyen, Q., Sood, A.: A comparison of intrusion-tolerant system architectures. IEEE Secur. Priv. 9(4), 24–31 (2010)CrossRef
20.
Zurück zum Zitat Platania, M., Obenshain, D., Tantillo, T., Sharma, R., Amir, Y.: Towards a practical survivable intrusion tolerant replication system. In: 2014 IEEE 33rd International Symposium on Reliable Distributed Systems, pp. 242–252. IEEE (2014) Platania, M., Obenshain, D., Tantillo, T., Sharma, R., Amir, Y.: Towards a practical survivable intrusion tolerant replication system. In: 2014 IEEE 33rd International Symposium on Reliable Distributed Systems, pp. 242–252. IEEE (2014)
21.
Zurück zum Zitat Ouffoué, G., Ortiz, A.M., Cavalli, A.R., Mallouli, W., Domingo-Ferrer, J., Sánchez, D., Zaïdi, F.: Intrusion detection and attack tolerance for cloud environments: the CLARUS approach. In: 2016 IEEE 36th International Conference on Distributed Computing Systems Workshops, ICDCSW, pp. 61–66. IEEE (2016) Ouffoué, G., Ortiz, A.M., Cavalli, A.R., Mallouli, W., Domingo-Ferrer, J., Sánchez, D., Zaïdi, F.: Intrusion detection and attack tolerance for cloud environments: the CLARUS approach. In: 2016 IEEE 36th International Conference on Distributed Computing Systems Workshops, ICDCSW, pp. 61–66. IEEE (2016)
22.
Zurück zum Zitat Ouffoué, G., Zaïdi, F., Cavalli, A.R., Lallali, M.: Model-based attack tolerance. In: 2017 31st International Conference on Advanced Information Networking and Applications Workshops, WAINA, pp. 68–73. IEEE (2017) Ouffoué, G., Zaïdi, F., Cavalli, A.R., Lallali, M.: Model-based attack tolerance. In: 2017 31st International Conference on Advanced Information Networking and Applications Workshops, WAINA, pp. 68–73. IEEE (2017)
Metadaten
Titel
Design of a Secure Shield for Internet and Web-Based Services Using Software Reflection
verfasst von
Ana R. Cavalli
Antonio M. Ortiz
Georges Ouffoué
Cesar A. Sanchez
Fatiha Zaïdi
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-94289-6_30

Premium Partner