Audit expert system of communication security assessment

被引:2
|
作者
Piech, Henryk [1 ]
Grodzki, Grzegorz [1 ]
机构
[1] Czestochowa Tech Univ, Dabrowskiego 73, PL-42201 Czestochowa, Poland
关键词
audit expert system; communication security; Petri nets; protocol security; auditing system; probability time automata; PETRI NETS;
D O I
10.1016/j.procs.2017.08.188
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The main goal of the research consists in the elaboration of a system concerning the investigation of security communication, which regards a set of security factors, such as: the degree of encryption, the freshness of nonces, intruder activation, the lifetime of keys, secrets, etc. This paper is devoted to the presentation of systematization formalisms describing the functioning of a security model. In our variant, we investigate the changes of all chosen factors (security attributes) during the realization of protocol operations. The security attributes should be systematically corrected in this process. It changes the general security level of communication. The audit system strategy leads us to one of the most noticeable security in fluence characteristics that refer to time parameters. We can introduce the notation concerning the lifetime of elements (key, message, nonces, secret, etc.). When the value of time activity of an element exceeds its lifetime, then the communication security is definitely threatened. By using special rules presented in the works of Burrows, and Needham(2), among other authors, and by creating additional logic formulas, we can estimate intermediate security probability parameters. Finally, we propose a certain kind of probability time automata in order to investigate and predicate different types of communication threats. These automata are built on the basis of a colored Petri net. In addition, this investigation consists in checking communication security (or a kind of threats) and making a threat prediction about possible cases that are connected with losing information. We also included in the model a procedure of security modification with respect to time (the activity of some parameters depends on time). We define the finite set of states by using the LU-technique (interval attribute activity) of a date notation. The proposed system resolves security problem in more comprehensive (multifaceted) way. Ingredient security factors can be grouped in different combinations. This approach increased the range of investigated threaten structures to even unknown hacker algorithm inventions. (C) 2017 The Authors. Published by Elsevier B.V.
引用
收藏
页码:147 / 156
页数:10
相关论文
共 50 条
  • [21] The Fourth Dimension of Information System Audit and Security
    Aggarwal, Akshai
    Kanhere, Sujata
    Kanhere, Vishnu
    Kanhere, Shankar
    SEPADS'09: PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN SOFTWARE ENGINEERING, PARALLEL AND DISTRIBUTED SYSTEMS, 2009, : 162 - +
  • [22] On the E-Commerce System Security Audit
    He Zhen
    ADVANCES IN MANAGEMENT OF TECHNOLOGY, PT 2, 2010, : 249 - 254
  • [23] AUDIT AND INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION
    Drastich, Martin
    SBORNIK Z MEZINARODNI VEDECKE KONFERENCE ZNALOSTI PRO TRZNI PRAXI 2012: VYZNAM ZNALOSTI V AKTUALNI FAZI EKONOMICKEHO CYKLU, 2012, : 49 - 52
  • [24] An Application of Probabilistic Risk Assessment to Information Security Audit
    Satoh, Naoki
    Kumamoto, Hiromitsu
    AIC '09: PROCEEDINGS OF THE 9TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED INFORMATICS AND COMMUNICATIONS: RECENT ADVANCES IN APPLIED INFORMAT AND COMMUNICATIONS, 2009, : 436 - +
  • [25] Communication system security issues
    Nilsson, S
    IEEE COMPUTER APPLICATIONS IN POWER, 2000, 13 (03): : 10 - 11
  • [26] AN ASSESSMENT OF EXPERT SYSTEM TECHNOLOGIES
    MASON, RO
    INFORMATION TECHNOLOGY AND MANAGEMENT STRATEGY, 1989, : 132 - 141
  • [27] Design and Implementation of Security Risk Assessment System for Electric Power Communication Network
    Zhu, Rui-Bo
    An, Yi
    Yu, Ning
    Rong, Li
    INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND AUTOMATION CONTROL (ICEEAC 2017), 2017, 123 : 482 - 487
  • [28] FEATURES OF A HYBRID EXPERT SYSTEM FOR SECURITY ENHANCEMENT
    REICHELT, D
    GLAVITSCH, H
    IEEE TRANSACTIONS ON POWER SYSTEMS, 1992, 7 (02) : 907 - 914
  • [29] Expert system for business decisions on security requirements
    Dobelis, Eriks
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: OTM 2007 WORKSHOPS, PT 1, PROCEEDINGS, 2007, 4805 : 46 - 47
  • [30] Expert system of selection and organization of a network security
    Zhuralev, V
    Makuta, Y
    Kozina, G
    EXPERIENCE OF DESIGNING AND APPLICATION OF CAD SYSTEMS IN MICROELECTRONICS, 2003, : 460 - 460