Robustness verification of soft security systems

被引:5
作者
Bidgoly, Amir Jalaly [1 ]
机构
[1] Univ Qom, Dept Informat Technol & Comp Engn, Qom, Iran
关键词
Soft security; Attack; Verification; Robustness; REPUTATION SYSTEMS; TRUST MANAGEMENT; QUANTITATIVE VERIFICATION; ATTACKS; DEFENSE; MODEL;
D O I
10.1016/j.jisa.2020.102632
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Soft security is a new generation of security methods that, unlike traditional ones such as encryption and access control (known as hard security), uses social-based control to secure a system. Like any other security method, soft security methods should be evaluated and verified against attacks before they are used; however, despite the increasing attractiveness and applications of these methods, their assessment and evaluation techniques are still in the early stages of the research. The concept of attack in the soft security methods is carried out not by breaking the rules and penetrating the system, but by following a hypocritical and misleading behavior that ultimately leads to the system deception and bypassing its security mechanism. Currently, the most important method for robustness evaluation of soft security is simulation that is not capable of providing a proof of system security. The research works which proposed a verification method for soft security systems are limited. In this paper, the challenges of the robustness verification of soft security systems are investigated, and a formal method for quantitative verification of these systems is proposed. The proposed method also introduces a robustness measure based on the worst possible attack against the system. Moreover, it is capable of finding new attacks against a system. The application of the proposed method is represented using some trust systems case studies.
引用
收藏
页数:11
相关论文
共 68 条
[1]   Analysis of a trust and reputation model applied to a computational Grid using software agents [J].
Albuquerque, Robson de Oliveira ;
Cohen, Fernanda Fontes ;
Teixeira Mota, Jovelina Lima ;
de Sousa Junior, Rafael Timoteo .
ICHIT 2008: INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, :196-203
[2]  
[Anonymous], 2000, P 33 ANN HAW INT C S
[3]  
[Anonymous], 2013, INT J ADV INTERNET T
[4]  
[Anonymous], 2009, P 5 INT WORKSH SEC T
[5]  
[Anonymous], **DATA OBJECT**, DOI DOI 10.5281/ZEN0D0.3345113
[6]  
[Anonymous], 2009, MARKOV DECISION PROC
[7]  
[Anonymous], 2012, P 2012 INT C COMP AP
[8]  
Barber KS, 2003, LECT NOTES ARTIF INT, V2631, P224
[10]   A MARKOVIAN DECISION PROCESS [J].
BELLMAN, R .
JOURNAL OF MATHEMATICS AND MECHANICS, 1957, 6 (05) :679-684