LV Junjie, WANG Yuanzhuo, LI Jingyuan, et al., “Security Analysis for Web Service Behaviors Based on Hierarchical Stochastic Game Model,” Chinese Journal of Electronics, vol. 24, no. 3, pp. 449-454, 2015, doi: 10.1049/cje.2015.07.002
Citation: LV Junjie, WANG Yuanzhuo, LI Jingyuan, et al., “Security Analysis for Web Service Behaviors Based on Hierarchical Stochastic Game Model,” Chinese Journal of Electronics, vol. 24, no. 3, pp. 449-454, 2015, doi: 10.1049/cje.2015.07.002

Security Analysis for Web Service Behaviors Based on Hierarchical Stochastic Game Model

doi: 10.1049/cje.2015.07.002
Funds:  This work is supported by National Natural Science Foundation of China (No.61402022, No.61173008, No.61303244, No.61370132), and Beijing Social Science Foundation (No.14JGB033).
More Information
  • Corresponding author: WANG Yuanzhuo (corresponding author) Ph.D., associate professor. He is a IEEE member and a senior member of China Computer Federation. His current research interests include social computing, open knowledge network, network security analysis, stochastic game model, etc. (Email: wangyuanzhuo@ict.ac.cn)
  • Received Date: 2013-11-11
  • Rev Recd Date: 2013-12-23
  • Publish Date: 2015-07-10
  • Model-based quantitative techniques are not commonly used for web service behaviors security evaluation, which have typically been applied to analyze small parts of an overall design. Aiming at the traits of attack behaviors for web services, this paper proposes the hierarchical Stochastic game nets (SGN) model and analysis methods. We give the definitions and important theorems of stochastic game nets, study the modeling algorithm of hierarchical SGN model. A series of simulation results are presented to show that, by applying hierarchical SGN model to describe the attack and defense behaviors in web services, quantifiable results can be successfully obtained for the evaluation of important attributes.
  • loading
  • L.J. Zhang and D.A. Grier, "Service oriented computing is overrated: Information infrastructure problems cannot be solved by service oriented computing (SOC) alone pro or con", Business week, 2008.
    D. Kuo, A. Fekete, P. Greenfield and S. Nepal, "Expressing and reasoning about service contracts in service-oriented computing", Proceedings of the International Conference on Web Services, ICWS, pp.915-918, 2006.
    P. Lindstrom, "Attacking and defending web service", A Spire Research Report, Tech. Rep., 2004.
    A. Avizienis, J. Laprie, B. Randell and C. Landwehr, "Basic concepts and taxonomy of dependable and secure computing", IEEE Transactions on Dependable and Secure Computing, Vol.1, No.1, pp.11-34, 2004.
    D.M. Nicol, W.H. Sanders and K.S. Trivedi, "Model-based evaluation: From dependability to security", IEEE Transactions on Dependable and Secure Computing, Vol.1, No.1, pp.48-66, 2004.
    C. Landwehr, "Formal models for computer security", Computer Surveys, Vol.13, No.3, pp.247-278, 1981.
    C. Lin, Y.Z. Wang and Y. Wang, "A stochastic game nets based approach for network security analysis", Proceedings of the 29th International Conference on Application and Theory of Petri Nets and Other Models of Concurrency, Concurrency Methods: Issues and Applications Workshop, pp.21-33, 2008.
    Y.Z.Wang, C. Lin and K. Meng, "Security analysis of enterprise network based on stochastic game nets model", Proceedings of the International Conference on Communications, ICC, 2009.
    J. Filar and K. Vrieze, Competitive Markov Decision Processes, Springer-Verlag, New York, 1996.
    G. Ciaodo, J. Muppala and K.S. Trivedi, "SPNP: Stochastic Petri net package", Proceedings of Petri Nets and Performance Models, pp.142-151, 1989.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (609) PDF downloads(1076) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return