(Received: 4-May-2021, Revised: 2-Jul.-2021 , Accepted: 9-Jul.-2021)
Carlos Gonzalez,
The objective of this article is to describe a process methodology to increase security inside secure military self- protected software. Self-protected software is vulnerable to threats, most dependant on the software user. Therefore, detection by self-protected software of the current user is very important. The methodology includes three phases: detection of user, analysis of current state and reaction actions. The detection phase is comprised of assessing geographic location, time at present location and determining user kind (friend or foe). Analysis phase consists of analysing if self-protected software should be at present location, predicting future locations and assessing the location level of threat. Reaction phase includes determining immediate and delay actions if any and perform actions accordingly. Legal concerns are explained, countermeasures and covert actions are proposed and described. An analytical model shows that self-protected software that includes user detection provides more protection than self-protected software without user detection.

[1] A. Deeks, "An International Legal Framework for Surveillance," Virginia Journal of International Law, HeinOnline, 2014.

[2] S. H. Amer and J. A. Hamilton, "Intrusion Detection Systems (IDS) Taxonomy: A Short Review," Journal of Software Technology, vol. 13, 2010. 

[3] T. F. Lunt, "A Survey of Intrusion Detection Techniques," Computers & Security, vol. 12, no. 4, pp. 405-418, 1993.

[4] Y. Zhang, W. Lee and Y. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks," Mobile Networks and Applications (Georgia Institute of Technology), pp. 1-16, [Online], Available:, 2003.

[5] M. Koch and K. Pauls, "Engineering Self-protection for Autonomous Systems," Proc. of the International Conference on Fundamental Approaches to Software Engineering (FASE 2006), Part of the Lecture Notes in Comp. Sci. Book Series, vol. 3922, pp. 33-47, DOI: 10.1007/11693017_5, 2006.

[6] Y. Al-Nashif, A. A. Kumar, S. Hariri, G. Qu, Y. Luo and F. Szidarovsky, "Multi-level Intrusion Detection System (ML-IDS)," Proceedings of the IEEE International Conference on Autonomic Computing (ICAC’08), pp. 131-140, Chicago, USA, 2008.

[7] A. Elkhodary and J. Whittle, "A Survey of Approaches to Adaptive Application Security," Proceedings of the Workshop on Software Engineering for Adaptive and Self-managing Systems (SEAMS’07), DOI: 10.1109/SEAMS.2007.2, Minneapolis, USA, 2007.

[8] A. Thakkar and R. Lohiya, "A Review of the Advancement in Intrusion Detection Datasets," Procedia Computer Science, vol. 167, pp. 636-645, 2020.

[9] K. Guercio, "Best Intrusion Detection and Prevention Systems for 2021: Guide to IDPS," eSecurityPlanet, [Online], Available: and-prevention-systems/, 2021.

[10] M. S. Ben Mahmoud, N. Larrieu, A. Pirovano and A. Varet, "An Adaptive Security Architecture for Future Aircraft Communications," Proceedings of the 29th Digital Avionics Systems IEEE Conference (DASC), DOI: 10.1109/DASC.2010.5655363, Salt Lake City, USA, 2010.

[11] K. John, "BAE Systems to Install Electronic Warfare (EW) Self-protection Pod to Help Defend P-8A Poseidon Aircraft," Military & Aerospace Electronics, [Online], Available: selfprotection, 2021.

[12] J. LaPadula Leonard, "Intrusion Detection for Air Force Networks," Mitre Technical Report, MTR 97B0000035, October 1997.

[13] A. Jay, "Intrusion Detection Systems: The First Line of Defense," SCIF Global Technologies, [Online], Available:, 2015.

[14] J. P. Mello Jr., "What is Runtime Application Self-protection (RASP)?," TechBeacon, [Online], Available: application- self-protection-a-must-have-emerging, 2016.

[15] J. Lavery, "The Future Is Now: Applications Protect Themselves against Attacks," Veracode, [Online], Available: -attacks, 2016.

[16] S. Giehl, "Device-detector," Github, [Online], Available: detector, 2021.

[17] H. Wen, P. Y.-R. Huang, J. Dyer, A. Archinal and J. Fagan, "Countermeasures for GPS Signal Spoofing," Proceedings of the 18th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS 2005), pp. 1285-1290, Long Beach, CA, 2005.

[18] C. Gonzalez, "Adaptive Standalone Secure Software," US Patent 10,521,613, B1, [Online], Available:, Dec. 2019.

[19] D. Robinson, "The Identity Crisis of International Criminal Law," Leiden Journal of International Law, vol. 21, pp. 925-963, 2008.

[20] R. Chesney, "The CIA, Covert Action and Operations in Cyberspace," Lawfare, [Online], Available:, July 2020.

[21] L. T. Greenberg, S. E. Goodman and K. J. Soo, Information Warfare and International Law, National Defense University Press, 1998.

[22] M. K. Kuschner, "Legal and Practical Constraints on Information Warfare," [Online], Available: [23] R. S. Dewar, "The Triptych of Cyber Security: A Classification of Active Cyber Defence," Proc. of the 6th International Conference on Cyber Conflict (CyCon), DOI: 10.1109/CYCON.2014.6916392, 2014. 

[24] L. Mälksoo, Russian Approaches to International Law, Oxford, ISBN-13: 978-0198808046, 2015.

[25] C. Cai, "International Law in Chinese Courts during the Rise of China," American Journal of International Law, vol. 110, no. 2, pp. 269-288, DOI:10.5305/amerjintelaw.110.2.0269, 2016.

[26] IEEE, "IEEE Standard for Software Safety Plans," IEEE Standards Association, IEEE 1228-1994, August 1994.

[27] Joint Software System Safety Committee, "Software System Safety Handbook: A Technical & Managerial Team Approach," US Department of Defense, [Online], Available:, Dec. 1999.

[28] N. G. Leveson, Safeware: System Safety and Computers, Addison-Wesley, 1995.

[29] MIL-STD-882E, "Department of Defense Standard Practice: System Safety," US Department of Defense, May 2012.

[30] C. Gonzalez, "Methods and Apparatus to Provide and Manage Security for the Access to Mobile Electronic Devices," US Patent, Patent no. US 7,941,669 B2, [Online], Available:, March 2015.

[31] P. Garcia-Teodoro, J. Diaz-Verdejo, G. Macia-Fernandez and E. Vazquez, "Anomaly-based Network Intrusion Detection: Techniques, Systems and Challenges," Comp. & Sec., vol. 28, pp. 18?28, 2009.

[32] D. Frincke, A. Wespi and D. Zamboni, "From Intrusion Detection to Self-protection," Comput. Netw., vol. 51, no. 5, pp. 1233-1238, [Online]. Available:, 2007.

[33] A. Nagarajan, Q. Nguyen, R. Banks and A. Sood, "Combining Intrusion Detection and Recovery for Enhancing System Dependability," Proceedings of the IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp. 25-30, Hong Kong, China, 2011.

[34] N. Stakhanova, S. Basu and J. Wong, "A Taxonomy of Intrusion Response Systems," Int. J. Inf. Comput. Sec., vol. 1, no. 1, pp. 169-184, 2007.

[35] J. J. Hagg, "A Simple Introduction to Obfuscated Code," Dream.In.Code, [Online], Available:, Sep. 2015.

[36] A. AlSobeh, S. AlShattnawi and A. Jarrah, "WEAVESIM: A Scalable and Reusable Cloud Simulation Framework Leveraging Aspect-oriented Programming," Jordanian Journal of Computers and Information Technology (JJCIT), vol. 06, no. 02, pp. 182-201, June 2020.