SlideShare a Scribd company logo
Liverpool John Moores University
                        Bo Zhou
               B.Zhou@ljmu.ac.uk
Overview
 SOA and its security issues


 Secure service composition adaptation


 0/1 knapsack problem


 Heuristic solution


 Simulated annealing
Service-oriented Architecture
 Foundation for modelling, planning, searching for and
 composing services.

 Offer new applications via composition of services.


 Facilitated by standardised interoperations among
 services.
  - WSDL, USDL, BPMN
A BPMN example
Security measures in SOA
 Verification is to ensure selected services comply with
 the security policy at both design- and run-time.
  - Changes in service behaviour or operating context could
    affect the stated composition behaviour.
  - There are variety of existing tools for performing
    analysis of individual or composed services. i.e. formal
    analysis and code analysis

 Inconsistent security policies and configurations must
 be continually monitored and addressed.
  - Countermeasures such as adaptation or recomposition.
Secure Service Composition
Adaptation
 Composition adaptation aims to mitigate issues identified during
  verification and monitoring.

 Adaptation is not straightforward due to the following reasons.
   - No direct suggestions from verification tools.
   - Concept of security is broad.
   - A simple substitution of a service may result in dramatic changes to the
     security properties of the entire composition.

 Individual success does not guarantee collective satisfactory.
   - For example, two services use different encryption algorithms.

 The secure composition adaptation issue is actually an optimisation
  problem with constraints.
   - Especially when facing wide choice of alternatives.
The 0/1 Knapsack Problem
     Given a set of items, each with a weight and a
 value, determine the items to be included in a
 combination so that the total weight is less than or
 equal to a given limit (e.g. the capacity of a knapsack)
 and the total value is as large as possible.
The 0/1 Knapsack Problem
Similarity to our problem
 Definition- Given a set of alternative services, what is
  the best combination of them in order to achieve the
  most secure service composition?
 There are always constraints while selecting services.
  - On trustworthiness, running efficiency and many other
    QoS and security related factors.
  - This is known as the 0/1 multidimensional knapsack
    problem.
 Focus on typical business decision where the user has
  to balance security withcost.
             Cost->Weight         Security->Value
Optimisation of Composition Adaptation
  Service
                          C
Composition


Composition   S1?         S2?       Sn?
   plan


 Candidate          S11       S21    Sn1
  Services


                S12           S22    Sn2


                S13                  Snm
Heuristics-based Solution
 Problems that have no polynomial-time algorithms are
  known for solving them.
  - NP-complete
 Exhaustive search is impractical.
   - Formal verification is a time consuming and resource
     wasting process
 Heuristic methods select compositions `intelligently‘,
  attempting to find increasingly successful solutions
  until an adequate answer is found.
  - Aiming for fast and accurate adaptation.
Simulated Annealing
 Used to solve NP-complete problems in general,
 including 0/1 knapsack problem.

 Named to mimic the chemical process when atoms in
 metal become placed in relative order during the
 process of being overheated to gradually being cooled.
The solution
1. Choose any feasible combination randomly.
2. Randomly select an item from the original items set n.
3. If the item has not been collected, add the item to the combination. If the new
        combination does not satisfy the weight constraint, randomly remove an item from
        the combination until it becomes feasible.
4. While in step 3 if the item has already been collected, remove this item and pick up
        another item from the items set that forms a new feasible combination.
5. If the new combination satisfies following equation, than the new combination will be
        accepted.                       V
                                    e T > R(0,1)

      where ΔV represents the change of value, T is the temperature, e is the mathematical
      constant and R(0, 1) generates a random number between 0 and 1.
6. For the value function V, if ΔV is a positive, that means the new combination has greater
      value and the equation is always true; if ΔV is negative, than the new combination has
      lower value. However, it is still possible that the new combination will be accepted. In
      effect, with larger T, the chance of satisfying the equation is higher.
7. Repeat steps 2-6 several times, decreasing the value of T at each step until a lower
      threshold for the value of T is reached.
8. When T reaches the threshold value, the current solution will be the best one we can get.
Quantify Services
 To apply the solution, we have to find away to quantify services.
   - Will allow direct comparison of services.

 Current proposal is to derive the security properties from service
  level agreement and catogorise them into four aspects.
   - Privacy, Confidentiality, Authenticity, Availability.
   - For example, `secured communication = true‘ contributes 0.5 to
     Confidentiality and 0.3 to Privacy; `encryption algorithm =
     3DES‘ contributes another extra 0.1 to Confidentiality.
       e.g. S = 0.4 × C + 0.2 × U + 0.1 × V + 0.3 × P
       where C represents the value of Confidentiality, U represents
  Authenticity, V represents Availability and P represents Privacy.
Future Work
 Prove the NP-completeness


 Examine the efficiency of Heuristics solutions
   - Adaptation speed and accuracy
   - Other solutions apart from Simulated Annealing
Summary
 SOA and its security issue
 Secure Service Composition Adaptation
 NP-complete with 0/1 knapsack problem
 Heuristic solutions such as Simulate Annealing



                          Q&A

More Related Content

Viewers also liked

Fractional knapsack class 13
Fractional knapsack class 13Fractional knapsack class 13
Fractional knapsack class 13
Kumar
 
Knapsack problem and Memory Function
Knapsack problem and Memory FunctionKnapsack problem and Memory Function
Knapsack problem and Memory Function
Barani Tharan
 
The mixed knapsack General Quiz v1- Gokul Panigrahi -20-Jun-2012
The mixed knapsack General Quiz v1- Gokul Panigrahi -20-Jun-2012The mixed knapsack General Quiz v1- Gokul Panigrahi -20-Jun-2012
The mixed knapsack General Quiz v1- Gokul Panigrahi -20-Jun-2012
Gokul Panigrahi
 
Knapsack Algorithm www.geekssay.com
Knapsack Algorithm www.geekssay.comKnapsack Algorithm www.geekssay.com
Knapsack Algorithm www.geekssay.com
Hemant Gautam
 
5.1 greedy
5.1 greedy5.1 greedy
5.1 greedy
Krish_ver2
 
Knapsack problem
Knapsack problemKnapsack problem
Knapsack problem
Vikas Sharma
 
01 knapsack using backtracking
01 knapsack using backtracking01 knapsack using backtracking
01 knapsack using backtracking
mandlapure
 
Knapsack
KnapsackKnapsack
Knapsack
Karthik Chetla
 

Viewers also liked (8)

Fractional knapsack class 13
Fractional knapsack class 13Fractional knapsack class 13
Fractional knapsack class 13
 
Knapsack problem and Memory Function
Knapsack problem and Memory FunctionKnapsack problem and Memory Function
Knapsack problem and Memory Function
 
The mixed knapsack General Quiz v1- Gokul Panigrahi -20-Jun-2012
The mixed knapsack General Quiz v1- Gokul Panigrahi -20-Jun-2012The mixed knapsack General Quiz v1- Gokul Panigrahi -20-Jun-2012
The mixed knapsack General Quiz v1- Gokul Panigrahi -20-Jun-2012
 
Knapsack Algorithm www.geekssay.com
Knapsack Algorithm www.geekssay.comKnapsack Algorithm www.geekssay.com
Knapsack Algorithm www.geekssay.com
 
5.1 greedy
5.1 greedy5.1 greedy
5.1 greedy
 
Knapsack problem
Knapsack problemKnapsack problem
Knapsack problem
 
01 knapsack using backtracking
01 knapsack using backtracking01 knapsack using backtracking
01 knapsack using backtracking
 
Knapsack
KnapsackKnapsack
Knapsack
 

Similar to A heuristic approach for secure service composition adaptation final

Thr russian doll search
Thr russian doll searchThr russian doll search
Diagnostic Test of Applied Economics
 Diagnostic Test of Applied Economics Diagnostic Test of Applied Economics
Diagnostic Test of Applied Economics
Suniya Sheikh
 
Assignment oprations research luv
Assignment oprations research luvAssignment oprations research luv
Assignment oprations research luv
Ashok Sharma
 
Trust Region Algorithm - Bachelor Dissertation
Trust Region Algorithm - Bachelor DissertationTrust Region Algorithm - Bachelor Dissertation
Trust Region Algorithm - Bachelor Dissertation
Christian Adom
 
Query Aware Determinization of Uncertain Objects
Query Aware Determinization of Uncertain ObjectsQuery Aware Determinization of Uncertain Objects
Query Aware Determinization of Uncertain Objects
nexgentechnology
 
QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
 QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
Nexgen Technology
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertain
nexgentech15
 
SMART CLOUD STORAGE SERVICE SELECTION BASED ON FUZZY LOGIC, THEORY OF EVIDEN...
 SMART CLOUD STORAGE SERVICE SELECTION BASED ON FUZZY LOGIC, THEORY OF EVIDEN... SMART CLOUD STORAGE SERVICE SELECTION BASED ON FUZZY LOGIC, THEORY OF EVIDEN...
SMART CLOUD STORAGE SERVICE SELECTION BASED ON FUZZY LOGIC, THEORY OF EVIDEN...
Nexgen Technology
 
Supplement to Chapter 04: Reliability
Supplement to Chapter 04: Reliability Supplement to Chapter 04: Reliability
Supplement to Chapter 04: Reliability
Sazedul Ekab
 
part-4-structural-equation-modelling-qr.pptx
part-4-structural-equation-modelling-qr.pptxpart-4-structural-equation-modelling-qr.pptx
part-4-structural-equation-modelling-qr.pptx
KaRim295737
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertain
Shakas Technologies
 
Guide
GuideGuide
Performance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning AlgorithmsPerformance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning Algorithms
Dinusha Dilanka
 
Operations Management VTU BE Mechanical 2015 Solved paper
Operations Management VTU BE Mechanical 2015 Solved paperOperations Management VTU BE Mechanical 2015 Solved paper
Operations Management VTU BE Mechanical 2015 Solved paper
Somashekar S.M
 
Final Report
Final ReportFinal Report
Final Report
Aman Soni
 
K-Nearest Neighbor Classifier
K-Nearest Neighbor ClassifierK-Nearest Neighbor Classifier
K-Nearest Neighbor Classifier
Neha Kulkarni
 
CS3114_09212011.ppt
CS3114_09212011.pptCS3114_09212011.ppt
CS3114_09212011.ppt
Arumugam90
 
A simple finite element solver for thermo-mechanical problems - margonari eng...
A simple finite element solver for thermo-mechanical problems - margonari eng...A simple finite element solver for thermo-mechanical problems - margonari eng...
A simple finite element solver for thermo-mechanical problems - margonari eng...
Scilab
 
Finding Robust Solutions to Requirements Models
Finding Robust Solutions to Requirements ModelsFinding Robust Solutions to Requirements Models
Finding Robust Solutions to Requirements Models
gregoryg
 
Reinforcement learning Research experiments OpenAI
Reinforcement learning Research experiments OpenAIReinforcement learning Research experiments OpenAI
Reinforcement learning Research experiments OpenAI
Raouf KESKES
 

Similar to A heuristic approach for secure service composition adaptation final (20)

Thr russian doll search
Thr russian doll searchThr russian doll search
Thr russian doll search
 
Diagnostic Test of Applied Economics
 Diagnostic Test of Applied Economics Diagnostic Test of Applied Economics
Diagnostic Test of Applied Economics
 
Assignment oprations research luv
Assignment oprations research luvAssignment oprations research luv
Assignment oprations research luv
 
Trust Region Algorithm - Bachelor Dissertation
Trust Region Algorithm - Bachelor DissertationTrust Region Algorithm - Bachelor Dissertation
Trust Region Algorithm - Bachelor Dissertation
 
Query Aware Determinization of Uncertain Objects
Query Aware Determinization of Uncertain ObjectsQuery Aware Determinization of Uncertain Objects
Query Aware Determinization of Uncertain Objects
 
QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
 QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertain
 
SMART CLOUD STORAGE SERVICE SELECTION BASED ON FUZZY LOGIC, THEORY OF EVIDEN...
 SMART CLOUD STORAGE SERVICE SELECTION BASED ON FUZZY LOGIC, THEORY OF EVIDEN... SMART CLOUD STORAGE SERVICE SELECTION BASED ON FUZZY LOGIC, THEORY OF EVIDEN...
SMART CLOUD STORAGE SERVICE SELECTION BASED ON FUZZY LOGIC, THEORY OF EVIDEN...
 
Supplement to Chapter 04: Reliability
Supplement to Chapter 04: Reliability Supplement to Chapter 04: Reliability
Supplement to Chapter 04: Reliability
 
part-4-structural-equation-modelling-qr.pptx
part-4-structural-equation-modelling-qr.pptxpart-4-structural-equation-modelling-qr.pptx
part-4-structural-equation-modelling-qr.pptx
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertain
 
Guide
GuideGuide
Guide
 
Performance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning AlgorithmsPerformance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning Algorithms
 
Operations Management VTU BE Mechanical 2015 Solved paper
Operations Management VTU BE Mechanical 2015 Solved paperOperations Management VTU BE Mechanical 2015 Solved paper
Operations Management VTU BE Mechanical 2015 Solved paper
 
Final Report
Final ReportFinal Report
Final Report
 
K-Nearest Neighbor Classifier
K-Nearest Neighbor ClassifierK-Nearest Neighbor Classifier
K-Nearest Neighbor Classifier
 
CS3114_09212011.ppt
CS3114_09212011.pptCS3114_09212011.ppt
CS3114_09212011.ppt
 
A simple finite element solver for thermo-mechanical problems - margonari eng...
A simple finite element solver for thermo-mechanical problems - margonari eng...A simple finite element solver for thermo-mechanical problems - margonari eng...
A simple finite element solver for thermo-mechanical problems - margonari eng...
 
Finding Robust Solutions to Requirements Models
Finding Robust Solutions to Requirements ModelsFinding Robust Solutions to Requirements Models
Finding Robust Solutions to Requirements Models
 
Reinforcement learning Research experiments OpenAI
Reinforcement learning Research experiments OpenAIReinforcement learning Research experiments OpenAI
Reinforcement learning Research experiments OpenAI
 

More from Aniketos EU FP7 Project

Privacy identity and trust challenges for the future internet citizen fabio...
Privacy identity and trust challenges for the future internet citizen   fabio...Privacy identity and trust challenges for the future internet citizen   fabio...
Privacy identity and trust challenges for the future internet citizen fabio...
Aniketos EU FP7 Project
 
20120709 cyber patterns2012
20120709 cyber patterns201220120709 cyber patterns2012
20120709 cyber patterns2012
Aniketos EU FP7 Project
 
Dynamic monitoring of composed services
Dynamic monitoring of composed servicesDynamic monitoring of composed services
Dynamic monitoring of composed services
Aniketos EU FP7 Project
 
Aniketos effects plus_6sep_2012-v04
Aniketos effects plus_6sep_2012-v04Aniketos effects plus_6sep_2012-v04
Aniketos effects plus_6sep_2012-v04
Aniketos EU FP7 Project
 
Aniketos trust bus_sept_2012
Aniketos trust bus_sept_2012Aniketos trust bus_sept_2012
Aniketos trust bus_sept_2012
Aniketos EU FP7 Project
 
Soc july-2012-dmitri-botvich
Soc july-2012-dmitri-botvichSoc july-2012-dmitri-botvich
Soc july-2012-dmitri-botvich
Aniketos EU FP7 Project
 
Demo summer soc-28062012
Demo summer soc-28062012Demo summer soc-28062012
Demo summer soc-28062012
Aniketos EU FP7 Project
 
Aniketos summary
Aniketos summaryAniketos summary
Aniketos summary
Aniketos EU FP7 Project
 
TSSG paper for International Symposium on Integrated Network Management (IM)
TSSG paper for International Symposium on Integrated Network Management (IM) TSSG paper for International Symposium on Integrated Network Management (IM)
TSSG paper for International Symposium on Integrated Network Management (IM)
Aniketos EU FP7 Project
 
Wewst11 trustworthiness monitoring of dynamic service compositions v2
Wewst11 trustworthiness monitoring of dynamic service compositions v2Wewst11 trustworthiness monitoring of dynamic service compositions v2
Wewst11 trustworthiness monitoring of dynamic service compositions v2
Aniketos EU FP7 Project
 

More from Aniketos EU FP7 Project (10)

Privacy identity and trust challenges for the future internet citizen fabio...
Privacy identity and trust challenges for the future internet citizen   fabio...Privacy identity and trust challenges for the future internet citizen   fabio...
Privacy identity and trust challenges for the future internet citizen fabio...
 
20120709 cyber patterns2012
20120709 cyber patterns201220120709 cyber patterns2012
20120709 cyber patterns2012
 
Dynamic monitoring of composed services
Dynamic monitoring of composed servicesDynamic monitoring of composed services
Dynamic monitoring of composed services
 
Aniketos effects plus_6sep_2012-v04
Aniketos effects plus_6sep_2012-v04Aniketos effects plus_6sep_2012-v04
Aniketos effects plus_6sep_2012-v04
 
Aniketos trust bus_sept_2012
Aniketos trust bus_sept_2012Aniketos trust bus_sept_2012
Aniketos trust bus_sept_2012
 
Soc july-2012-dmitri-botvich
Soc july-2012-dmitri-botvichSoc july-2012-dmitri-botvich
Soc july-2012-dmitri-botvich
 
Demo summer soc-28062012
Demo summer soc-28062012Demo summer soc-28062012
Demo summer soc-28062012
 
Aniketos summary
Aniketos summaryAniketos summary
Aniketos summary
 
TSSG paper for International Symposium on Integrated Network Management (IM)
TSSG paper for International Symposium on Integrated Network Management (IM) TSSG paper for International Symposium on Integrated Network Management (IM)
TSSG paper for International Symposium on Integrated Network Management (IM)
 
Wewst11 trustworthiness monitoring of dynamic service compositions v2
Wewst11 trustworthiness monitoring of dynamic service compositions v2Wewst11 trustworthiness monitoring of dynamic service compositions v2
Wewst11 trustworthiness monitoring of dynamic service compositions v2
 

Recently uploaded

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 

Recently uploaded (20)

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 

A heuristic approach for secure service composition adaptation final

  • 1. Liverpool John Moores University Bo Zhou B.Zhou@ljmu.ac.uk
  • 2. Overview  SOA and its security issues  Secure service composition adaptation  0/1 knapsack problem  Heuristic solution  Simulated annealing
  • 3. Service-oriented Architecture  Foundation for modelling, planning, searching for and composing services.  Offer new applications via composition of services.  Facilitated by standardised interoperations among services. - WSDL, USDL, BPMN
  • 5. Security measures in SOA  Verification is to ensure selected services comply with the security policy at both design- and run-time. - Changes in service behaviour or operating context could affect the stated composition behaviour. - There are variety of existing tools for performing analysis of individual or composed services. i.e. formal analysis and code analysis  Inconsistent security policies and configurations must be continually monitored and addressed. - Countermeasures such as adaptation or recomposition.
  • 6. Secure Service Composition Adaptation  Composition adaptation aims to mitigate issues identified during verification and monitoring.  Adaptation is not straightforward due to the following reasons. - No direct suggestions from verification tools. - Concept of security is broad. - A simple substitution of a service may result in dramatic changes to the security properties of the entire composition.  Individual success does not guarantee collective satisfactory. - For example, two services use different encryption algorithms.  The secure composition adaptation issue is actually an optimisation problem with constraints. - Especially when facing wide choice of alternatives.
  • 7. The 0/1 Knapsack Problem Given a set of items, each with a weight and a value, determine the items to be included in a combination so that the total weight is less than or equal to a given limit (e.g. the capacity of a knapsack) and the total value is as large as possible.
  • 9. Similarity to our problem  Definition- Given a set of alternative services, what is the best combination of them in order to achieve the most secure service composition?  There are always constraints while selecting services. - On trustworthiness, running efficiency and many other QoS and security related factors. - This is known as the 0/1 multidimensional knapsack problem.  Focus on typical business decision where the user has to balance security withcost. Cost->Weight Security->Value
  • 10. Optimisation of Composition Adaptation Service C Composition Composition S1? S2? Sn? plan Candidate S11 S21 Sn1 Services S12 S22 Sn2 S13 Snm
  • 11. Heuristics-based Solution  Problems that have no polynomial-time algorithms are known for solving them. - NP-complete  Exhaustive search is impractical. - Formal verification is a time consuming and resource wasting process  Heuristic methods select compositions `intelligently‘, attempting to find increasingly successful solutions until an adequate answer is found. - Aiming for fast and accurate adaptation.
  • 12. Simulated Annealing  Used to solve NP-complete problems in general, including 0/1 knapsack problem.  Named to mimic the chemical process when atoms in metal become placed in relative order during the process of being overheated to gradually being cooled.
  • 13. The solution 1. Choose any feasible combination randomly. 2. Randomly select an item from the original items set n. 3. If the item has not been collected, add the item to the combination. If the new combination does not satisfy the weight constraint, randomly remove an item from the combination until it becomes feasible. 4. While in step 3 if the item has already been collected, remove this item and pick up another item from the items set that forms a new feasible combination. 5. If the new combination satisfies following equation, than the new combination will be accepted. V e T > R(0,1) where ΔV represents the change of value, T is the temperature, e is the mathematical constant and R(0, 1) generates a random number between 0 and 1. 6. For the value function V, if ΔV is a positive, that means the new combination has greater value and the equation is always true; if ΔV is negative, than the new combination has lower value. However, it is still possible that the new combination will be accepted. In effect, with larger T, the chance of satisfying the equation is higher. 7. Repeat steps 2-6 several times, decreasing the value of T at each step until a lower threshold for the value of T is reached. 8. When T reaches the threshold value, the current solution will be the best one we can get.
  • 14. Quantify Services  To apply the solution, we have to find away to quantify services. - Will allow direct comparison of services.  Current proposal is to derive the security properties from service level agreement and catogorise them into four aspects. - Privacy, Confidentiality, Authenticity, Availability. - For example, `secured communication = true‘ contributes 0.5 to Confidentiality and 0.3 to Privacy; `encryption algorithm = 3DES‘ contributes another extra 0.1 to Confidentiality. e.g. S = 0.4 × C + 0.2 × U + 0.1 × V + 0.3 × P where C represents the value of Confidentiality, U represents Authenticity, V represents Availability and P represents Privacy.
  • 15. Future Work  Prove the NP-completeness  Examine the efficiency of Heuristics solutions - Adaptation speed and accuracy - Other solutions apart from Simulated Annealing
  • 16. Summary  SOA and its security issue  Secure Service Composition Adaptation  NP-complete with 0/1 knapsack problem  Heuristic solutions such as Simulate Annealing Q&A

Editor's Notes

  1. provides the plat-form for services from different providers to work together. SOAs offer new applications via composition of services
  2. If changes in service behaviour or operating context could affect the stated com-position behaviour, countermeasures have to be taken, possibly including re-composition or adaptation
  3. In the field of theoretical computer science, it has beendemonstrated that there are some optimisation problemshave no straightforward solutions that are computational-ly practical enough, i.e. such that no polynomial-time al-gorithms are known for solving them. These problems aredened as NP-complete if they can be veried in polynomialtime
  4. With verification technique
  5. One prerequisite