Title :
Information System´s Security Evaluation of Dynamic Behavior Based on Service Composition
Author :
DanChen Wang;Yang Xu;Peng Xu
Author_Institution :
Sichuan Inf. Security Testing Evaluation Center, Southwest Jiao Tong Univ., Chengdu, China
Abstract :
In the complex network environment, system service is dynamically adjusted according to the changes of user behavior and computing environment. Also, security strategy tends to be more dynamic based on the work flow, which will bring new challenges to the security evaluation of system operation. Therefore, this paper aims to regard the service composition business as research object, focusing on the analysis of security equipment´s character that deployed by the system, abstracting the behavior of security service, classifying it to the business service, and systematically solving the security evaluation problems in business operation. Meanwhile, user behavior pattern is established on the cloud-model theory, and fully studied in the premise of ensuring the structural accuracy of work flow. Then, by analyzing the credibility of user behavior, the utility function is defined from the relation between threat and protection, and the security service efficiency identified by the change operation set of security service. Furthermore, a guaranteeing method is raised to the rational reconstruction by a security component, which produces an adequate redundant path of component service according to the existing executive record and logical structure, so as to reach the goal of ensuring the operation security of system business.
Keywords :
"Security","Business","Analytical models","Data models","Systems operation","Hardware","Object recognition"
Conference_Titel :
Intelligent Systems and Knowledge Engineering (ISKE), 2015 10th International Conference on
DOI :
10.1109/ISKE.2015.71