[go: up one dir, main page]

Luo et al., 2025 - Google Patents

MicroGuard: Non-Intrusive Dynamic Analysis for Inter-Service Access Control of Microservices

Luo et al., 2025

View PDF
Document ID
6748657306062239006
Author
Luo H
Yang W
Chen P
Publication year
Publication venue
Proceedings of the 16th International Conference on Internetware

External Links

Snippet

Cloud-native systems enable high-scalibility for application development and deployment with loosely coupled microservices that interact over the network, but they also introduce security risks, potentially leading to unauthorized inter-service access. To mitigate such …
Continue reading at dl.acm.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
US9992166B2 (en) Hierarchical rule development and binding for web application server firewall
US12107874B2 (en) Automated intelligent detection and mitigation of cyber security threats
US10795992B2 (en) Self-adaptive application programming interface level security monitoring
US11017107B2 (en) Pre-deployment security analyzer service for virtual computing resources
US20130019314A1 (en) Interactive virtual patching using a web application server firewall
Porras et al. A security enforcement kernel for OpenFlow networks
US10097574B2 (en) Auto-tuning program analysis tools based on user feedback
US10686791B1 (en) Secure cloud computing framework
CN110083338A (en) Service system based on intelligent gateway
Tang et al. Ssldetecter: detecting SSL security vulnerabilities of android applications based on a novel automatic traversal method
CN118540108A (en) Threat matrix-based cloud primary network policy generation method and device
Vasilevskaya et al. Integrating security mechanisms into embedded systems by domain‐specific modelling
Thorn et al. 5gac-analyzer: Identifying over-privilege between 5g core network functions
Ben Jaballah et al. A grey-box approach for detecting malicious user interactions in web applications
Pace Zero Trust networks with Istio
Meng Security and performance tradeoff analysis of offloading policies in mobile cloud computing
Luo et al. MicroGuard: Non-Intrusive Dynamic Analysis for Inter-Service Access Control of Microservices
Cheng et al. PDFuzzerGen: Policy‐Driven Black‐Box Fuzzer Generation for Smart Devices
Cheng et al. MSLFuzzer: black-box fuzzing of SOHO router devices via message segment list inference
CN111385249B (en) A Vulnerability Detection Method
CN119697240B (en) Access control methods and related equipment for microservice systems
CN112560083A (en) Safety protection method and device and electronic equipment
US12549574B1 (en) Insecure model context protocol server remediation for artificial intelligence agents
US20260012488A1 (en) Near real time aggregation using dynamic data extraction
Dohnal Microservices for automated threat response to phishing