Audit expert system of communication security assessment

被引:2
|
作者
Piech, Henryk [1 ]
Grodzki, Grzegorz [1 ]
机构
[1] Czestochowa Tech Univ, Dabrowskiego 73, PL-42201 Czestochowa, Poland
关键词
audit expert system; communication security; Petri nets; protocol security; auditing system; probability time automata; PETRI NETS;
D O I
10.1016/j.procs.2017.08.188
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The main goal of the research consists in the elaboration of a system concerning the investigation of security communication, which regards a set of security factors, such as: the degree of encryption, the freshness of nonces, intruder activation, the lifetime of keys, secrets, etc. This paper is devoted to the presentation of systematization formalisms describing the functioning of a security model. In our variant, we investigate the changes of all chosen factors (security attributes) during the realization of protocol operations. The security attributes should be systematically corrected in this process. It changes the general security level of communication. The audit system strategy leads us to one of the most noticeable security in fluence characteristics that refer to time parameters. We can introduce the notation concerning the lifetime of elements (key, message, nonces, secret, etc.). When the value of time activity of an element exceeds its lifetime, then the communication security is definitely threatened. By using special rules presented in the works of Burrows, and Needham(2), among other authors, and by creating additional logic formulas, we can estimate intermediate security probability parameters. Finally, we propose a certain kind of probability time automata in order to investigate and predicate different types of communication threats. These automata are built on the basis of a colored Petri net. In addition, this investigation consists in checking communication security (or a kind of threats) and making a threat prediction about possible cases that are connected with losing information. We also included in the model a procedure of security modification with respect to time (the activity of some parameters depends on time). We define the finite set of states by using the LU-technique (interval attribute activity) of a date notation. The proposed system resolves security problem in more comprehensive (multifaceted) way. Ingredient security factors can be grouped in different combinations. This approach increased the range of investigated threaten structures to even unknown hacker algorithm inventions. (C) 2017 The Authors. Published by Elsevier B.V.
引用
收藏
页码:147 / 156
页数:10
相关论文
共 50 条
  • [41] STRUCTURING THE ASSESSMENT OF AUDIT EVIDENCE - AN EXPERT SYSTEMS-APPROACH - DISCUSSION
    BAILEY, AD
    AUDITING-A JOURNAL OF PRACTICE & THEORY, 1990, 9 : 88 - 94
  • [42] ESIA Expert System for Systems Audit Risk-Based
    Dario Duque-Mendez, Nestor
    Tabares-Morales, Valentina
    Gonzalez, Hector
    ADVANCES IN ARTIFICIAL INTELLIGENCE - IBERAMIA 2018, 2018, 11238 : 483 - 494
  • [43] STRUCTURING THE ASSESSMENT OF AUDIT EVIDENCE - AN EXPERT SYSTEMS-APPROACH - DISCUSSION
    ALDERSLEY, SJ
    AUDITING-A JOURNAL OF PRACTICE & THEORY, 1990, 9 : 95 - 102
  • [44] Security system for road automobile communication system
    Volner, R
    ITI 2000: PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES, 2000, : 73 - 80
  • [45] Expert systems for Information Security Management and Audit. Implementation phase issues.
    Kanatov, Maksat
    Atymtayeva, Lyazzat
    Yagaliyeva, Bagdat
    2014 JOINT 7TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND INTELLIGENT SYSTEMS (SCIS) AND 15TH INTERNATIONAL SYMPOSIUM ON ADVANCED INTELLIGENT SYSTEMS (ISIS), 2014, : 896 - 900
  • [46] ESDC - AN EXPERT SYSTEM FOR DATA COMMUNICATION DESIGN
    KHAKHAR, D
    FERNEBRO, L
    CARLSSON, S
    INTEGRATED NETWORK MANAGEMENT, 1, 1989, : 315 - 322
  • [47] The Study on the Information Security Audit Guideline for SCADA System
    Lee, ChulSoo
    Hong, Seng-phil
    Kang, Sungmin
    Kim, Jaehyoun
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2009, 12 (01): : 147 - 162
  • [48] Design and Realization of Network Security Audit and Monitoring System
    Wang Yilei
    Gao Xianfeng
    Tao, Li
    Sun Yujuan
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON TEST AUTOMATION & INSTRUMENTATION, VOLS 1-2, 2008, : 1029 - 1032
  • [49] The Optimization Method of the Integrated Management System Security Audit
    Livshitz, Ilya
    Lontsikh, Pavel
    Eliseev, Sergey
    PROCEEDINGS OF THE 20TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT 2017), 2017, : 248 - 253
  • [50] Security Audit of a University Information System: A Functional Model
    Kan, Andrei
    Albatsha, Ahmad
    SOFTWARE ENGINEERING PERSPECTIVES IN SYSTEMS, VOL. 1, 2022, 501 : 557 - 564