Laravel is the well-known framework heavily uses for the PHP application development. However due to aging factor such as PHP version, associated databases, environments, operating system, the framework continuously exposures to vulnerability and it became vital issue in cyber security. The establishment of this paper is to investigate the elements and proposed adaptive framework to ensure elements within Laravel are iteratively evaluated for the security purposes. The suggested environment is the autonomic computing where the self-properties established.

1.
Hadlington
,
L.
(
2017
).
Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours
.
Heliyon
,
3
(
7
),
e00346
.
2.
Zhang
,
X.
, &
Gupta
,
R.
(
2003
, March). Hiding program slices for software security. In
International Symposium on Code Generation and Optimization, 2003. CGO 2003.
(pp.
325
336
).
IEEE
.
3.
Jones
,
S. L.
,
Collins
,
E. I.
,
Levordashka
,
A.
,
Muir
,
K.
, &
Joinson
,
A.
(
2019
, May).
What is’ Cyber Security’? Differential Language of Cyber Security Across the Lifespan
. In
Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems
(pp.
1
6
).
4.
Alagheband
,
M. R.
,
Mashatan
,
A.
, &
Zihayat
,
M.
(
2020
).
Time-based gap analysis of cybersecurity trends in academic and digital media
.
ACM Transactions on Management Information Systems (TMIS)
,
11
(
4
),
1
20
.
5.
Sharbaf
,
M.
(
2019
, August). Reengineering Cyber Security Process: A New Perspective on Cyber Security Quality Management. In
2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)
(pp.
332
337
).
IEEE
.
6.
Volkova
,
A.
,
Niedermeier
,
M.
,
Basmadjian
,
R.
, &
de Meer
,
H.
(
2018
).
Security challenges in control network protocols: A survey
.
IEEE Communications Surveys & Tutorials
,
21
(
1
),
619
639
.
7.
Cotroneo
,
D.
,
Natella
,
R.
,
Pietrantuono
,
R.
, &
Russo
,
S.
(
2014
).
A survey of software aging and rejuvenation studies
.
ACM Journal on Emerging Technologies in Computing Systems (JETC)
,
10
(
1
),
1
34
.
8.
Waslo
,
R.
,
Lewis
,
T.
,
Hajj
,
R.
, &
Carton
,
R.
(
2017
).
Industry 4.0 and cybersecurity: Managing risk in an age of connected production.
9.
Blackwood-Brown
,
C. G.
(
2018
).
An Empirical Assessment of Senior Citizens’ Cybersecurity Awareness, Computer Self-Efficacy
,
Perceived Risk of Identity Theft, Attitude, and Motivation to Acquire Cybersecurity Skills.
11.
Li
,
X.
,
Karnan
,
S.
, &
Chishti
,
J. A.
(
2017
, November). An empirical study of three PHP frameworks. In
2017 4th International Conference on Systems and Informatics (ICSAI)
(pp.
1636
1640
).
IEEE
.
12.
Ferreira
,
H.
,
Xavier
,
A.
,
Romão
,
M.
, &
Barão
,
A.
(
2019
, June). Multifunctional SaaS Framework. In
2019 14th Iberian Conference on Information Systems and Technologies (CISTI)
(pp.
1
5
).
IEEE
.
13.
Yadav
,
N.
,
Rajpoot
,
D. S.
, &
Dhakad
,
S. K.
(
2019
, November). LARAVEL: A PHP Framework for E-Commerce Website. In
2019 Fifth International Conference on Image Information Processing (ICIIP)
(pp.
503
508
).
IEEE
.
14.
Gunawan
,
A.
(
2020
, August). Selection Of Web-Based Framework for System Development using AHP (Analytic Hierarchy Process) Method in PT. XYZ. In
2020 International Conference on Information Management and Technology (ICIMTech)
(pp.
148
152
).
IEEE
.
15.
Ramalingaiah
,
A.
, &
Sulthana
,
T.
(
2018
, December). Study of Blockchain with Bitcoin based Fund Raise Use case using Laravel Framework. In
2018 3rd International Conference on Computational Systems and Information Technology for Sustainable Solutions (CSITSS)
(pp.
254
258
).
IEEE
.
16.
Sendiang
,
M.
,
Kasenda
,
S.
,
Polii
,
A.
, &
Putung
,
Y. R.
(
2018
, October). Optimizing Laravel Authentication Process. In
2018 International Conference on Applied Science and Technology (iCAST)
(pp.
247
251
).
IEEE
.
17.
Lara
,
E.
,
Aguilar
,
L.
,
Sanchez
,
M. A.
, &
García
,
J. A.
(
2019
). Adaptive Security Based on MAPE-K: A Survey. In
Applied Decision-Making
(pp.
157
183
).
Springer
,
Cham
.
18.
Elgendi
,
I.
,
Hossain
,
M. F.
,
Jamalipour
,
A.
, &
Munasinghe
,
K. S.
(
2019
).
Protecting cyber physical systems using a learned MAPE-K model
.
IEEE Access
,
7
,
90954
-
90963
.
19.
Amoud
,
M.
, &
Roudies
,
O.
(
2016
, June). MaPE-K-based approach for security@ runtime. In
2016 IEEE International Conference on Software Science, Technology and Engineering (SWSTE)
(pp.
138
140
).
IEEE
.
20.
Evesti
,
A.
, &
Ovaska
,
E.
(
2013
).
Comparison of adaptive information security approaches
.
International Scholarly Research Notices
, 2013.
21.
Yuan
,
E.
, &
Malek
,
S.
(
2012
, June). A taxonomy and survey of self-protecting software systems. In
2012 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)
(pp.
109
118
).
IEEE
.
22.
Jahan
,
S.
,
Riley
,
I.
,
Walter
,
C.
,
Gamble
,
R. F.
,
Pasco
,
M.
,
McKinley
,
P. K.
, &
Cheng
,
B. H.
(
2020
).
MAPE-K/MAPE-SAC: An interaction framework for adaptive systems with security assurance cases
.
Future Generation Computer Systems
,
109
,
197
209
.
23.
Akkaya
,
B.
, &
Tabak
,
A.
(
2020
).
The link between organizational agility and leadership: A research in science parks
.
Academy of Strategic Management Journal
,
19
(
1
),
1
17
.
24.
Grant
,
G. J.
(
2010
).
Ascertaining the relationship between security awareness and the security behavior of individuals.
This content is only available via PDF.
You do not currently have access to this content.