tegrating different policies to manage medical edge
devices’ and clusters’ configurations. In particu-
lar, existing frameworks have paid limited atten-
tion to the critical role of efficient recovery man-
agement (Alessandro, 2022), (CISKubernetes, 2022),
(Darryl, 2022), (Fairwinds, 2023), (Joe, 2022), (Kyle,
2020). Hence, this paper: (1) mapped the observed
performance degradation (failure) to its hidden abnor-
mal flow of information (fault) and misconfiguration
type (error) and (2) selected the optimal recovery pol-
icy with optimum actions to optimize the performance
of the system under observation.
6 CONCLUSIONS AND FUTURE
WORK
Securing workloads and information flow against
misconfiguration in container-based clusters and edge
medical devices is an important part of overall system
security. This paper presented a controller that ana-
lyzes the misconfiguration, maps the observation to
its hidden misconfiguration type, and selects the op-
timal recovery policy to maximize the performance
of defined metrics. In the future, we will integrate
streaming from different edge devices, expand the re-
covery mechanism, and conduct more experiments.
ACKNOWLEDGEMENT
This research was funded in part by The Research
Council of Norway under grant numbers 274451 and
263248.
REFERENCES
Moothedath, S., Sahabandu, D., Allen, J., Clark, A., Bush-
nell, L., Lee, W., and Poovendran, R. (2020). Dy-
namic Information Flow Tracking for Detection of
Advanced Persistent Threats: A Stochastic Game Ap-
proach. In arXiv:2006.12327.
Kraus, S., Schiavone, F., Pluzhnikova, A., and Invernizzi,
A. C. (2021). Digital Transformation in Healthcare:
Analyzing The Current State-of-Research. Journal of
Business Research, 123:557–567.
Sklavos, N., Zaharakis, I. D., Kameas, A., and Kalapodi, A.
(2017). Security & Trusted Devices in the Context of
Internet of Things (IoT). In The proceedings of 20th
EUROMICRO Conference on Digital System Design,
Architectures, Methods, Tools (DSD’17), pages 502–
509.
Luo, Y., Li, W., and Qiu, S. (2020). Anomaly Detec-
tion Based Latency-Aware Energy Consumption Opti-
mization For IoT Data-Flow Services. Sensors, 20:1–
20.
M
¨
akitalo, N., Ometov, A., Kannisto, J., Andreev, S., Kouch-
eryavy, Y., and Mikkonen, T. (2018). Safe and Se-
cure Execution at the Network Edge: A Framework
for Coordinating Cloud, Fog, and Edge. IEEE Soft-
ware, 35:30–37.
Guo, M., Li, L., and Guan, Q. (2019). Energy-Efficient and
Delay-Guaranteed Workload Allocation in IoT-Edge-
Cloud. IEEE Access, 7:78685–78697.
Fine, S., Singer, Y., and Tishby, N. (1998). The Hierarchical
Hidden Markov Model: Analysis and Applications.
Machine Learning, 32:41–62.
Derman, C. (1970). Finite State Markovian Decision Pro-
cesses. Academic Press, New York
Sorkunlu, N., Chandola, V., and Patra, A. (2017). Track-
ing System Behavior from Resource Usage Data. In
The proceedings of IEEE International Conference on
Cluster Computing (ICCC), pages 410–418.
Wang, T., Xu, J., Zhang, W., Gu, Z., and Zhong, H.
(2018). Self-Adaptive Cloud Monitoring with On-
line Anomaly Detection. Future Generation Com-
puter Systems, 80:89–101.
Sohal, A.S., Sandhu, R., Sood, S.K., and Chang, V. A.
(2018) Cybersecurity Framework to Identify Mali-
cious Edge Device in Fog Computing and Cloud-of-
Things Environments. Computer Security, 74:340–
354.
Sukhwani, H., Sharma, V., and Sharma, S. (2014). A Sur-
vey of Anomaly Detection Techniques and Hidden
Markov Model. International Journal of Computer
Applications, 93:975–8887.
Ge, N., Nakajima, S., and Pantel, M. (2015). Online Diag-
nosis of Accidental Faults for Real-Time Embedded
Systems Using a Hidden Markov Model. Simulation,
91:851–868.
Borgi, G. (2018). Real-Time Detection of Advanced Per-
sistent Threats Using Information Flow Tracking and
Hidden Markov. Doctoral Dissertation.
Alessandro, M. (2022). Nearly One Million Exposed
Misconfigured Kubernetes Instances Could Cause
Breaches. https://www.infosecurity-magazine.co
m/news/misconfigured-kubernetes-exposed/
CIS Kubernetes Benchmarks. (2022). Securing Kubernetes
An Objective, Consensus-Driven Security Guideline
For The Kubernetes Server Software. https://www.ci
security.org/benchmark/kubernetes
Darryl, T. (2022). ARMO: Misconfiguration Is Number 1
Kubernetes Security Risk. https://thenewstack.io/arm
o-misconfiguration-is-number-1-kubernetes-securit
y-risk/
Fairwinds. (2023). Kubernetes Configuration Benchmark
Report. https://www.fairwinds.com/kubernetes-con
fig-benchmark-report
Joe, P. (2020). Common Kubernetes Misconfiguration Vul-
nerabilities. https://www.fairwinds.com/blog/kuberne
tes-misconfigurations
Kyle, A. (2020). Major Vulnerability Found in Open Source
Dev Tool For Kubernetes. https://venturebeat.com/se
curity/major-vulnerability-found-in-open-source-dev
-tool-for-kubernetes/
ICISSP 2023 - 9th International Conference on Information Systems Security and Privacy
772