Abstract
There are several methods to assess the capability of a organization to prevent attacks in a potentially wrong collaborative scenario.
In this paper we explore a methodology based on considering some probabilistic information. We assume that we are provided with a probabilistic user model. This is a model denoting the probability that the entity interacting with the system takes each available choice.
We show how to build these models using the log files. Moreover, we define the meaning of a good, a bad and a suspicious behavior. Finally, we present a mechanism to share the information presented in each node of the collaborative system.
Research partially supported by the Spanish MCYT project TESIS (TIN2009-14312-C02-01).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Agrawal, R., Imieliński, T., Swami, A.: Mining association rules between sets of items in large databases. In: 19th ACM Int. Conf. on Management of Data, SIGMOD 1993, pp. 207–216. ACM Press (1993)
Andrés, C., Llana, L., Rodríguez, I.: Formally comparing user and implementer model-based testing methods. In: 4th Workshop on Advances in Model Based Testing, A-MOST 2008, pp. 1–10. IEEE Computer Society (2008)
Andrés, C., Merayo, M.G., Núñez, M.: Using a mining frequency patterns model to automate passive testing of real-time systems. In: 21st Int. Conf. on Software Engineering & Knowledge Engineering, SEKE 2009, pp. 426–431. Knowledge Systems Institute (2009)
Cao, J., Chen, J., Zhao, H., Li, M.: A policy-based authorization model for workflow-enabled dynamic process management. Journal of Network and Computer Applications 32(2), 412–422 (2009)
Coma, C., Cuppens-Boulahia, N., Cuppens, F., Cavalli, A.R.: Interoperability of context based system policies using O2O contract. In: Proceedings of the 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems, SITIS 2008, pp. 137–144. IEEE (2008)
Elrakaiby, Y., Cuppens, F., Cuppens-Boulahia, N.: Formal enforcement and management of obligation policies. Data & Knowledge Engineering 71(1), 127–147 (2012)
Frank, E., Hall, M., Holmes, G., Kirkby, R., Pfahringer, B.: Weka - a machine learning workbench for data mining. In: Maimon, O., Rokach, L. (eds.) The Data Mining and Knowledge Discovery Handbook, pp. 1305–1314. Springer (2005)
Franke, U.J.: Managing virtual web organizations in the 21st century. IGI Publishing (2002)
Hoogendoorn, M., Jonker, C.M., Schut, M.C., Treur, J.: Modeling centralized organization of organizational change. Computational & Mathematical Organization Theory 13(2), 147–184 (2007)
Liao, S.-H., Huang, H.-C., Chen, Y.-N.: A Semantic Web Approach to Heterogeneous Metadata Integration. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part I. LNCS, vol. 6421, pp. 205–214. Springer, Heidelberg (2010)
Nguyen, T.-D., Islam, M. M., Al-Saffar, A., Park, J.-Y., Huh, E.-N.: Secure Collaborative Cloud Design for Global USN Services. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part I. LNCS, vol. 6421, pp. 178–187. Springer, Heidelberg (2010)
Salay, R., Mylopoulos, J.: The Model Role Level – A Vision. In: Parsons, J., Saeki, M., Shoval, P., Woo, C., Wand, Y. (eds.) ER 2010. LNCS, vol. 6412, pp. 76–89. Springer, Heidelberg (2010)
Travica, B.: Virtual organization and electronic commerce. SIGMIS Database 36(3), 45–68 (2005)
Woodcock, J., Larsen, P.G., Bicarregui, J., Fitzgerald, J.: Formal methods: Practice and experience. ACM Computing Surveys 41, 19:1–19:36 (2009)
Wu, M.-T., Hong, T.-P., Lee, C.-N.: An Improved Ant Algorithm for Fuzzy Data Mining. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS, vol. 6422, pp. 344–351. Springer, Heidelberg (2010)
Zamfirescu, C.-B., Candea, C.: Planning in Collaborative Stigmergic Workspaces. In: Jędrzejowicz, P., Nguyen, N.T., Hoang, K. (eds.) ICCCI 2011, Part II. LNCS, vol. 6923, pp. 160–169. Springer, Heidelberg (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Andrés, C., Núñez, A., Núñez, M. (2012). Preventing Attacks by Classifying User Models in a Collaborative Scenario. In: Nguyen, NT., Hoang, K., Jȩdrzejowicz, P. (eds) Computational Collective Intelligence. Technologies and Applications. ICCCI 2012. Lecture Notes in Computer Science(), vol 7653. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34630-9_52
Download citation
DOI: https://doi.org/10.1007/978-3-642-34630-9_52
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34629-3
Online ISBN: 978-3-642-34630-9
eBook Packages: Computer ScienceComputer Science (R0)