Enhancing Workflow Security in Multi-Cloud Environments through
Monitoring and Adaptation upon Cloud Service and Network Security Violations
- URL: http://arxiv.org/abs/2310.01878v1
- Date: Tue, 3 Oct 2023 08:33:46 GMT
- Title: Enhancing Workflow Security in Multi-Cloud Environments through
Monitoring and Adaptation upon Cloud Service and Network Security Violations
- Authors: Nafiseh Soveizi and Dimka Karastoyanova
- Abstract summary: We propose an approach that focuses on monitoring cloud services and networks to detect security violations during workflow executions.
Our approach is evaluated based on the performance of the detection procedure and the impact of the selected adaptations on the workflow.
- Score: 2.5835347022640254
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Cloud computing has emerged as a crucial solution for handling data- and
compute-intensive workflows, offering scalability to address dynamic demands.
However, ensuring the secure execution of workflows in the untrusted
multi-cloud environment poses significant challenges, given the sensitive
nature of the involved data and tasks. The lack of comprehensive approaches for
detecting attacks during workflow execution, coupled with inadequate measures
for reacting to security and privacy breaches has been identified in the
literature. To close this gap, in this work, we propose an approach that
focuses on monitoring cloud services and networks to detect security violations
during workflow executions. Upon detection, our approach selects the optimal
adaptation action to minimize the impact on the workflow. To mitigate the
uncertain cost associated with such adaptations and their potential impact on
other tasks in the workflow, we employ adaptive learning to determine the most
suitable adaptation action. Our approach is evaluated based on the performance
of the detection procedure and the impact of the selected adaptations on the
workflows.
Related papers
- Fast and Robust: Task Sampling with Posterior and Diversity Synergies for Adaptive Decision-Makers in Randomized Environments [78.15330971155778]
Posterior and Diversity Synergized Task Sampling (PDTS) is an easy-to-implement method to accommodate fast and robust sequential decision-making.
PDTS unlocks the potential of robust active task sampling, significantly improves the zero-shot and few-shot adaptation robustness in challenging tasks, and even accelerates the learning process under certain scenarios.
arXiv Detail & Related papers (2025-04-27T07:27:17Z) - Model Predictive Task Sampling for Efficient and Robust Adaptation [46.92143725900031]
We introduce Model Predictive Task Sampling (MPTS), a framework that bridges the task space and adaptation risk landscape.
MPTS employs a generative model to characterize the episodic optimization process and predicts task-specific adaptation risk via posterior inference.
MPTS seamlessly integrates into zero-shot, few-shot, and supervised finetuning settings.
arXiv Detail & Related papers (2025-01-19T13:14:53Z) - Flow: Modularized Agentic Workflow Automation [53.073598156915615]
Multi-agent frameworks powered by large language models (LLMs) have demonstrated great success in automated planning and task execution.
However, the effective adjustment of agentic during execution has not been well studied.
In this paper, we define an activity-on-vertex (AOV) graph, which allows continuous workflow refinement by agents.
Our proposed multi-agent framework achieves efficient concurrent execution of subtasks, effective goal achievement, and enhanced error tolerance.
arXiv Detail & Related papers (2025-01-14T04:35:37Z) - Reinforcement Learning-Driven Adaptation Chains: A Robust Framework for Multi-Cloud Workflow Security [2.186901738997927]
Cloud computing has emerged as a crucial solution for managing data-intensive and compute-intensive tasks.
One of the main gaps in the literature is the lack of robust and flexible measures for reacting to security violations.
We propose an innovative approach leveraging Reinforcement Learning (RL) to formulate adaptation chains, responding effectively to security violations.
arXiv Detail & Related papers (2025-01-10T19:04:55Z) - TabSec: A Collaborative Framework for Novel Insider Threat Detection [8.27921273043059]
In the era of the Internet of Things (IoT) and data sharing, users frequently upload their personal information to enterprise databases to enjoy enhanced service experiences.
However, the widespread presence of system vulnerabilities, remote network intrusions, and insider threats significantly increases the exposure of private enterprise data on the internet.
This paper proposes a novel threat detection framework, TabITD, to address these challenges.
arXiv Detail & Related papers (2024-11-04T04:07:16Z) - Benchmarking Agentic Workflow Generation [80.74757493266057]
We introduce WorFBench, a unified workflow generation benchmark with multi-faceted scenarios and intricate graph workflow structures.
We also present WorFEval, a systemic evaluation protocol utilizing subsequence and subgraph matching algorithms.
We observe that the generated can enhance downstream tasks, enabling them to achieve superior performance with less time during inference.
arXiv Detail & Related papers (2024-10-10T12:41:19Z) - Mimicking User Data: On Mitigating Fine-Tuning Risks in Closed Large Language Models [53.50543146583101]
Fine-tuning large language models on small datasets can enhance their performance on specific downstream tasks.
Malicious actors can subtly manipulate the structure of almost any task-specific dataset to foster significantly more dangerous model behaviors.
We propose a novel mitigation strategy that mixes in safety data which mimics the task format and prompting style of the user data.
arXiv Detail & Related papers (2024-06-12T18:33:11Z) - Adaptive Testing Environment Generation for Connected and Automated
Vehicles with Dense Reinforcement Learning [7.6589102528398065]
We develop an adaptive testing environment that bolsters evaluation robustness by incorporating multiple surrogate models.
We propose the dense reinforcement learning method and devise a new adaptive policy with high sample efficiency.
arXiv Detail & Related papers (2024-02-29T15:42:33Z) - SecFlow: Adaptive Security-Aware Workflow Management System in
Multi-Cloud Environments [2.12121796606941]
We propose an architecture for a security-aware workflow management system (WfMS)
SecFlow integrates key functional components such as secure model construction, security-aware service selection, security violation detection, and adaptive response mechanisms.
arXiv Detail & Related papers (2023-07-11T09:27:07Z) - Adaptive Real Time Exploration and Optimization for Safety-Critical
Systems [0.0]
We propose the ARTEO algorithm, where we cast multi-armed bandits as a programming problem subject to safety constraints.
We learn the environmental characteristics through changes in optimization inputs and through exploration.
Compared to existing safe-learning approaches, our algorithm does not require an exclusive exploration phase and follows the optimization goals even in the explored points.
arXiv Detail & Related papers (2022-11-10T11:37:22Z) - Log Barriers for Safe Black-box Optimization with Application to Safe
Reinforcement Learning [72.97229770329214]
We introduce a general approach for seeking high dimensional non-linear optimization problems in which maintaining safety during learning is crucial.
Our approach called LBSGD is based on applying a logarithmic barrier approximation with a carefully chosen step size.
We demonstrate the effectiveness of our approach on minimizing violation in policy tasks in safe reinforcement learning.
arXiv Detail & Related papers (2022-07-21T11:14:47Z) - Networked Online Learning for Control of Safety-Critical
Resource-Constrained Systems based on Gaussian Processes [9.544146562919792]
We propose a novel networked online learning approach based on Gaussian process regression.
We propose an effective data transmission scheme between the local system and the cloud taking bandwidth limitations and time delay of the transmission channel into account.
arXiv Detail & Related papers (2022-02-23T13:12:12Z) - Benchmarking Safe Deep Reinforcement Learning in Aquatic Navigation [78.17108227614928]
We propose a benchmark environment for Safe Reinforcement Learning focusing on aquatic navigation.
We consider a value-based and policy-gradient Deep Reinforcement Learning (DRL)
We also propose a verification strategy that checks the behavior of the trained models over a set of desired properties.
arXiv Detail & Related papers (2021-12-16T16:53:56Z) - Lifelong Unsupervised Domain Adaptive Person Re-identification with
Coordinated Anti-forgetting and Adaptation [127.6168183074427]
We propose a new task, Lifelong Unsupervised Domain Adaptive (LUDA) person ReID.
This is challenging because it requires the model to continuously adapt to unlabeled data of the target environments.
We design an effective scheme for this task, dubbed CLUDA-ReID, where the anti-forgetting is harmoniously coordinated with the adaptation.
arXiv Detail & Related papers (2021-12-13T13:19:45Z) - One Solution is Not All You Need: Few-Shot Extrapolation via Structured
MaxEnt RL [142.36621929739707]
We show that learning diverse behaviors for accomplishing a task can lead to behavior that generalizes to varying environments.
By identifying multiple solutions for the task in a single environment during training, our approach can generalize to new situations.
arXiv Detail & Related papers (2020-10-27T17:41:57Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.