首页> 外文期刊>IEEE transactions on automation science and engineering >Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns
【24h】

Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns

机译:考虑恶意行为模式的在线购物业务流程建模与验证

获取原文
获取原文并翻译 | 示例

摘要

Recently, online shopping integrating third-party payment platforms (TPPs) introduces new security challenges due to complex interactions between Application Programming Interfaces (APIs) of Merchants and TPPs. Malicious clients may exploit security vulnerabilities by calling APIs in an arbitrary order or playing various roles. To deal with the security issue in the early stages of system development, this paper presents a formal method for modeling and verification of online shopping business processes with malicious behavior patterns considered based on Petri nets. We propose a formal model called E-commerce Business Process Net to model a normal online shopping business process that represent intended functions, and malicious behavior patterns representing a potential attack that violates the security goals at the requirement analysis phase. Then, we synthesize the normal business process and malicious behavior patterns by an incremental modeling method. According to the synthetic model, we analyze whether an online shopping business process is resistant to the known malicious behavior patterns. As a result, our approach can make the software design provably secured from the malicious attacks at process design time and, thus, reduces the difficulty and cost of modification for imperfect systems at the release phase. We demonstrate our approach through a case study.
机译:最近,由于商家和TPP的应用程序编程接口(API)之间复杂的交互作用,集成了第三方支付平台(TPP)的在线购物带来了新的安全挑战。恶意客户端可以通过以任意顺序调用API或扮演各种角色来利用安全漏洞。为了解决系统开发初期的安全问题,本文提出了一种基于Petri网的具有恶意行为模式的在线购物业务流程建模和验证的正式方法。我们提出了一个名为E-commerce Business Process Net的正式模型,以对表示预期功能的正常在线购物业务流程进行建模,并在需求分析阶段对表示可能违反安全目标的潜在攻击的恶意行为模式进行建模。然后,我们通过增量建模方法综合正常业务流程和恶意行为模式。根据综合模型,我们分析了在线购物业务流程是否能够抵抗已知的恶意行为模式。结果,我们的方法可以使软件设计在流程设计时可证明地免受恶意攻击,从而减少了在发布阶段修改不完善系统的难度和成本。我们通过案例研究证明了我们的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号