Audit expert system of communication security assessment

被引:2
|
作者
Piech, Henryk [1 ]
Grodzki, Grzegorz [1 ]
机构
[1] Czestochowa Tech Univ, Dabrowskiego 73, PL-42201 Czestochowa, Poland
关键词
audit expert system; communication security; Petri nets; protocol security; auditing system; probability time automata; PETRI NETS;
D O I
10.1016/j.procs.2017.08.188
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The main goal of the research consists in the elaboration of a system concerning the investigation of security communication, which regards a set of security factors, such as: the degree of encryption, the freshness of nonces, intruder activation, the lifetime of keys, secrets, etc. This paper is devoted to the presentation of systematization formalisms describing the functioning of a security model. In our variant, we investigate the changes of all chosen factors (security attributes) during the realization of protocol operations. The security attributes should be systematically corrected in this process. It changes the general security level of communication. The audit system strategy leads us to one of the most noticeable security in fluence characteristics that refer to time parameters. We can introduce the notation concerning the lifetime of elements (key, message, nonces, secret, etc.). When the value of time activity of an element exceeds its lifetime, then the communication security is definitely threatened. By using special rules presented in the works of Burrows, and Needham(2), among other authors, and by creating additional logic formulas, we can estimate intermediate security probability parameters. Finally, we propose a certain kind of probability time automata in order to investigate and predicate different types of communication threats. These automata are built on the basis of a colored Petri net. In addition, this investigation consists in checking communication security (or a kind of threats) and making a threat prediction about possible cases that are connected with losing information. We also included in the model a procedure of security modification with respect to time (the activity of some parameters depends on time). We define the finite set of states by using the LU-technique (interval attribute activity) of a date notation. The proposed system resolves security problem in more comprehensive (multifaceted) way. Ingredient security factors can be grouped in different combinations. This approach increased the range of investigated threaten structures to even unknown hacker algorithm inventions. (C) 2017 The Authors. Published by Elsevier B.V.
引用
收藏
页码:147 / 156
页数:10
相关论文
共 50 条
  • [1] Methodology and Ontology of Expert System for Information Security Audit
    Atymtayeva, Lyazzat B.
    Bortsova, Gerda K.
    Inoue, Atsushi
    Kozhakhmet, Kanat T.
    6TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND INTELLIGENT SYSTEMS, AND THE 13TH INTERNATIONAL SYMPOSIUM ON ADVANCED INTELLIGENT SYSTEMS, 2012, : 238 - 243
  • [2] CQR - A HYBRID EXPERT SYSTEM FOR SECURITY ASSESSMENT
    CHRISTIE, RD
    TALUKDAR, SN
    NIXON, JC
    IEEE TRANSACTIONS ON POWER SYSTEMS, 1990, 5 (04) : 1503 - 1509
  • [3] Information System Audit for Mobile Device Security Assessment
    Abu Othman, Noor Ashitah
    Norman, Azah Anir
    Kiah, Miss Laiha Mat
    2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC), 2021, : 50 - 55
  • [4] Diagnostics and Assessment of the Industrial Network Security Expert System
    Repp, Polina
    2017 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING, APPLICATIONS AND MANUFACTURING (ICIEAM), 2017,
  • [5] INTEGRATION OF AN EXPERT SYSTEM FOR SECURITY ASSESSMENT INTO AN ENERGY MANAGEMENT-SYSTEM
    HANDSCHIN, E
    HOFFMANN, W
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 1992, 14 (2-3) : 243 - 248
  • [6] EXPERT SYSTEM SECURITY
    OLEARY, DE
    IEEE EXPERT-INTELLIGENT SYSTEMS & THEIR APPLICATIONS, 1990, 5 (03): : 59 - &
  • [7] An Expert System for Risk Assessment of Information System Security Based on ISO 27002
    Sihwi, Sari Widya
    Andriyanto, Ferry
    Anggrainingsih, Rini
    2016 IEEE INTERNATIONAL CONFERENCE ON KNOWLEDGE ENGINEERING AND APPLICATIONS (ICKEA 2016), 2016, : 56 - 61
  • [8] Fuzzy expert system shell development with computer security assessment application
    Remik, Leon
    Jacques, Robert St.
    2007 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-4, 2007, : 253 - 258
  • [9] Graded Security Expert System
    Kivimaa, Jueri
    Ojamaa, Andres
    Tyugu, Enn
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2009, 5508 : 279 - +
  • [10] A Security Audit Framework to Manage Information System Security
    Pereira, Teresa
    Santos, Henrique
    GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, 2010, 92 : 9 - +