Design and Generation of a Set of Declarative APIs for Security Orchestration

被引:0
|
作者
Islam, Chadni [1 ]
Babar, M. Ali [2 ]
Nepal, Surya [3 ]
机构
[1] Queensland Univ Technol, Sch Comp Sci, Brisbane, Qld 4000, Australia
[2] Univ Adelaide, CREST Ctr Res Engn Software Technol, Sch Comp Sci, Adelaide, SA 5005, Australia
[3] CSIROs Data61, Sydney, NSW 2015, Australia
关键词
Declarative API; incident response process; natural language processing; SOAR; security operation centre; security orchestration; security orchestration and automation; security tool integration; semantic technology; ONTOLOGY;
D O I
10.1109/TSC.2023.3336666
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emerging threat landscape causes continuous change in the Incident Response Process (IRP) and security tools of security orchestration platforms (SOAR). Users of such platforms often struggle to adapt to these changes because they are addressed in an ad-hoc manner through a complex architecture. The complex design of the SOAR can be hidden behind an easy-to-use user interface. This article introduces a Declarative API (DAPI)-driven Orchestration approach, DecOr, that alleviates the need for security teams' detailed understanding of the libraries and plugins to address the changes of a SOAR. DecOr comprises 1) three sets of dAPIs to encapsulate the activities of security orchestration and 2) a semantic framework to support the design and generation of dAPIs from task descriptions, leveraging natural language processing techniques. The dAPIs are mapped with an ontological knowledge base to execute IRPs. We experimentally evaluate the effectiveness and efficiency of DecOr based on 147 task and dAPI pairs, curated from real-world playbooks. We show the end-to-end process from identifying dAPIs to executing 48 IRPs with seven security tools. The evaluation results show, DecOr accurately generates dAPIs in near real-time, with precision and recall values over 80% and successfully executes changing IRPs 93% of the time.
引用
收藏
页码:127 / 141
页数:15
相关论文
共 50 条
  • [1] Security and Privacy by Declarative Design
    Maffei, Matteo
    Pecina, Kim
    Reinert, Manuel
    [J]. 2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2013, : 81 - 96
  • [2] Declarative Policy Support for Cloud Application Orchestration
    Alexander, Kena
    Lee, Choonwha
    Chai, Seungmok
    [J]. 2017 19TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - OPENING NEW ERA OF SMART SOCIETY, 2017, : 102 - 104
  • [3] A vocabulary and execution model for declarative service orchestration
    Goedertier, Stijn
    Vanthienen, Jan
    [J]. BUSINESS PROCESS MANAGEMENT WORKSHOPS, 2008, 4928 : 496 - 501
  • [4] Specification for security Orchestration
    Goutam, Aradhana
    Kamal, Raj
    Ingle, Maya
    [J]. INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 429 - 441
  • [5] Security Test Generation by Answer Set Programming
    Zech, Philipp
    Felderer, Michael
    Katt, Basel
    Breu, Ruth
    [J]. 2014 EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY, 2014, : 88 - 97
  • [6] A Declarative Approach for Service Enablement on Hybrid Cloud Orchestration Engines
    Asthana, Neeraj
    Chefalas, Tom
    Karve, Alexei
    Segal, Alla
    Dubey, Mahika
    Zeng, Sai
    [J]. NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [7] The need for declarative security mechanisms
    Probst, S
    Küng, J
    [J]. PROCEEDINGS OF THE 30TH EUROMICRO CONFERENCE, 2004, : 526 - 531
  • [8] Security Wrapper Orchestration in Cloud
    Kalliola, Aapo
    Lal, Shankar
    Ahola, Kimmo
    Oliver, Ian
    Miche, Yoan
    Aura, Tuomas
    [J]. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [9] Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs
    Gorski, Peter Leo
    Acar, Yasemin
    Lo Iacono, Luigi
    Fahl, Sascha
    [J]. PROCEEDINGS OF THE 2020 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'20), 2020,
  • [10] Hierarchical and declarative security for grid applications
    Attali, Isabelle
    Caromel, Denis
    Contes, Arnaud
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2003, 2913 : 363 - 372