TUHH Open Research
Help
  • Log In
    New user? Click here to register.Have you forgotten your password?
  • English
  • Deutsch
  • Communities & Collections
  • Publications
  • Research Data
  • People
  • Institutions
  • Projects
  • Statistics
  1. Home
  2. TUHH
  3. Publications
  4. Detection strategies for microservice security tactics
 
Options

Detection strategies for microservice security tactics

Citation Link: https://doi.org/10.15480/882.14855
Publikationstyp
Journal Article
Date Issued
2024-05-01
Sprache
English
Author(s)
Zdun, Uwe  
Queval, Pierre-Jean  
Simhandl, Georg  
Scandariato, Riccardo  
Software Security E-22  
Chakravarty, Somik  
Jelić, Marjan  
Jovanovic, Aleksandar  
TORE-DOI
10.15480/882.14855
TORE-URI
https://hdl.handle.net/11420/42552
Journal
IEEE transactions on dependable and secure computing  
Volume
21
Issue
3
Start Page
1257
End Page
1273
Citation
IEEE Transactions on Dependable and Secure Computing 21 (3): 1257-1273 (2024)
Publisher DOI
10.1109/TDSC.2023.3276487
Scopus ID
2-s2.0-85160216527
Microservice architectures are widely used today to implement distributed systems. Securing microservice architectures is challenging because of their polyglot nature, continuous evolution, and various security concerns relevant to such architectures. This article proposes a novel, model-based approach providing detection strategies to address the automated detection of security tactics (or patterns and best practices) in a given microservice architecture decomposition model. Our novel detection strategies are metrics-based rules that decide conformance to a security recommendation based on a statistical predictor. The proposed approach models this recommendation using Architectural Design Decisions (ADDs). We apply our approach for four different security-related ADDs on access management, traffic control, and avoiding plaintext sensitive data in the context of microservice systems. We then apply our approach to a model data set of 10 open-source microservice systems and 20 variants of those systems. Our results are detection strategies showing a very low bias, a very high correlation, and a low prediction error in our model data set.
Subjects
Authorization
Codes
Computer architecture
Conformance Checking
Data models
Detection Strategies
Measurement
Metrics
Microservice architectures
Microservice Architecture Security
Microservices
Security
DDC Class
600: Technology
Funding(s)
Assurance and certification in secure Multi-party Open Software and Services  
Publication version
publishedVersion
Lizenz
https://creativecommons.org/licenses/by/4.0/
Loading...
Thumbnail Image
Name

Detection_Strategies_for_Microservice_Security_Tactics.pdf

Type

Main Article

Size

4.3 MB

Format

Adobe PDF

TUHH
Weiterführende Links
  • Contact
  • Send Feedback
  • Cookie settings
  • Privacy policy
  • Impress
DSpace Software

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science
Design by effective webwork GmbH

  • Deutsche NationalbibliothekDeutsche Nationalbibliothek
  • ORCiD Member OrganizationORCiD Member Organization
  • DataCiteDataCite
  • Re3DataRe3Data
  • OpenDOAROpenDOAR
  • OpenAireOpenAire
  • BASE Bielefeld Academic Search EngineBASE Bielefeld Academic Search Engine
Feedback