首页> 外文学位 >Identification and Elimination of Attacks in Graph-based Process Models.
【24h】

Identification and Elimination of Attacks in Graph-based Process Models.

机译:在基于图的过程模型中识别和消除攻击。

获取原文
获取原文并翻译 | 示例

摘要

A process is a collection of steps, reading and writing data and annotations on data, carried out by either human or automated agents, to accomplish a specific goal. The agents in our process, through their interactions with the data and annotations via the steps, can carry out various privacy breaching attacks. By "privacy breach", we mean that an individual's personally identifiable information is disclosed to other individuals, without the former's consent. It is difficult to automatically identify these rogue agents and offending steps, which remain hidden among a large number of other non-malicious agents and steps. This dissertation presents a novel approach that automatically identifies the different ways in which an attack (mostly privacy breach related attack) can take place on a process. We first develop a graph-based language to model processes and possible attacks. Given a process and a possible attack modeled in this language, our approach determines if this attack can be successfully carried out on the process. If successful, our approach also finds out in how many different ways this same attack can be carried out on the process. We also identify collusion scenarios where multiple agents can collude to realize an attack. Attacks on complex processes which have collection-oriented data hierarchies (multiple data possessing parent-child relationship among them) and fine grained data dependencies, are also identified. Once an attack is found to be successful against a process, we automatically identify improvement opportunities in the process and carry them out, thereby eliminating ways in which the attack can succeed. The identification uses information about which steps in the process are most heavily attacked, and try to find improvement opportunities in them first, before moving onto the lesser attacked ones. We then evaluate the improved process to verify that our improvement is successful. This cycle of process improvement and evaluation iterates until all possible ways of attack are either thwarted or the remaining attack ways cannot be eliminated by the identified improvement opportunities.
机译:流程是由人工或自动代理执行的步骤的集合,这些步骤用于读写数据和数据注释,以实现特定目标。我们过程中的代理通过这些步骤与数据和注释的交互,可以进行各种侵犯隐私的攻击。所谓“侵犯隐私”,是指未经他人同意而将个人的个人识别信息透露给其他人。很难自动识别这些恶意代理和令人讨厌的步骤,这些恶意代理和令人讨厌的步骤仍然隐藏在许多其他非恶意代理和步骤中。本文提出了一种新颖的方法,该方法可以自动识别攻击(主要是与隐私泄露相关的攻击)在进程中发生的不同方式。我们首先开发一种基于图形的语言来对流程和可能的攻击进行建模。给定一个使用这种语言建模的过程和可能的攻击,我们的方法将确定是否可以在该过程中成功进行此攻击。如果成功,我们的方法还将找出可以在该过程中执行相同攻击的方式有几种不同的方式。我们还确定了多个代理可以合谋实施攻击的共谋场景。还确定了对复杂过程的攻击,这些过程具有面向集合的数据层次结构(多个数据之间具有父子关系)和精细的数据依赖性。一旦发现针对某个流程的攻击是成功的,我们将自动识别并改进流程中的改进机会,从而消除攻击成功的途径。标识使用有关过程中哪些步骤受到最严重攻击的信息,并在转移到受攻击程度较小的步骤之前,先尝试在其中找到改进机会。然后,我们评估改进的过程,以验证改进是否成功。反复进行过程改进和评估的循环,直到所有可能的攻击方式被挫败,或者通过确定的改进机会无法消除其余的攻击方式。

著录项

  • 作者

    Sarkar, Anandarup.;

  • 作者单位

    University of California, Davis.;

  • 授予单位 University of California, Davis.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2015
  • 页码 180 p.
  • 总页数 180
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号