Skip to main content

Preventing Attacks by Classifying User Models in a Collaborative Scenario

  • Conference paper
Computational Collective Intelligence. Technologies and Applications (ICCCI 2012)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7653))

Included in the following conference series:

  • 1149 Accesses

Abstract

There are several methods to assess the capability of a organization to prevent attacks in a potentially wrong collaborative scenario.

In this paper we explore a methodology based on considering some probabilistic information. We assume that we are provided with a probabilistic user model. This is a model denoting the probability that the entity interacting with the system takes each available choice.

We show how to build these models using the log files. Moreover, we define the meaning of a good, a bad and a suspicious behavior. Finally, we present a mechanism to share the information presented in each node of the collaborative system.

Research partially supported by the Spanish MCYT project TESIS (TIN2009-14312-C02-01).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, R., Imieliński, T., Swami, A.: Mining association rules between sets of items in large databases. In: 19th ACM Int. Conf. on Management of Data, SIGMOD 1993, pp. 207–216. ACM Press (1993)

    Google Scholar 

  2. Andrés, C., Llana, L., Rodríguez, I.: Formally comparing user and implementer model-based testing methods. In: 4th Workshop on Advances in Model Based Testing, A-MOST 2008, pp. 1–10. IEEE Computer Society (2008)

    Google Scholar 

  3. Andrés, C., Merayo, M.G., Núñez, M.: Using a mining frequency patterns model to automate passive testing of real-time systems. In: 21st Int. Conf. on Software Engineering & Knowledge Engineering, SEKE 2009, pp. 426–431. Knowledge Systems Institute (2009)

    Google Scholar 

  4. Cao, J., Chen, J., Zhao, H., Li, M.: A policy-based authorization model for workflow-enabled dynamic process management. Journal of Network and Computer Applications 32(2), 412–422 (2009)

    Article  Google Scholar 

  5. Coma, C., Cuppens-Boulahia, N., Cuppens, F., Cavalli, A.R.: Interoperability of context based system policies using O2O contract. In: Proceedings of the 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems, SITIS 2008, pp. 137–144. IEEE (2008)

    Google Scholar 

  6. Elrakaiby, Y., Cuppens, F., Cuppens-Boulahia, N.: Formal enforcement and management of obligation policies. Data & Knowledge Engineering 71(1), 127–147 (2012)

    Article  Google Scholar 

  7. Frank, E., Hall, M., Holmes, G., Kirkby, R., Pfahringer, B.: Weka - a machine learning workbench for data mining. In: Maimon, O., Rokach, L. (eds.) The Data Mining and Knowledge Discovery Handbook, pp. 1305–1314. Springer (2005)

    Google Scholar 

  8. Franke, U.J.: Managing virtual web organizations in the 21st century. IGI Publishing (2002)

    Google Scholar 

  9. Hoogendoorn, M., Jonker, C.M., Schut, M.C., Treur, J.: Modeling centralized organization of organizational change. Computational & Mathematical Organization Theory 13(2), 147–184 (2007)

    Article  Google Scholar 

  10. Liao, S.-H., Huang, H.-C., Chen, Y.-N.: A Semantic Web Approach to Heterogeneous Metadata Integration. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part I. LNCS, vol. 6421, pp. 205–214. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  11. Nguyen, T.-D., Islam, M. M., Al-Saffar, A., Park, J.-Y., Huh, E.-N.: Secure Collaborative Cloud Design for Global USN Services. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part I. LNCS, vol. 6421, pp. 178–187. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  12. Salay, R., Mylopoulos, J.: The Model Role Level – A Vision. In: Parsons, J., Saeki, M., Shoval, P., Woo, C., Wand, Y. (eds.) ER 2010. LNCS, vol. 6412, pp. 76–89. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  13. Travica, B.: Virtual organization and electronic commerce. SIGMIS Database 36(3), 45–68 (2005)

    Article  Google Scholar 

  14. Woodcock, J., Larsen, P.G., Bicarregui, J., Fitzgerald, J.: Formal methods: Practice and experience. ACM Computing Surveys 41, 19:1–19:36 (2009)

    Article  Google Scholar 

  15. Wu, M.-T., Hong, T.-P., Lee, C.-N.: An Improved Ant Algorithm for Fuzzy Data Mining. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS, vol. 6422, pp. 344–351. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  16. Zamfirescu, C.-B., Candea, C.: Planning in Collaborative Stigmergic Workspaces. In: Jędrzejowicz, P., Nguyen, N.T., Hoang, K. (eds.) ICCCI 2011, Part II. LNCS, vol. 6923, pp. 160–169. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Andrés, C., Núñez, A., Núñez, M. (2012). Preventing Attacks by Classifying User Models in a Collaborative Scenario. In: Nguyen, NT., Hoang, K., Jȩdrzejowicz, P. (eds) Computational Collective Intelligence. Technologies and Applications. ICCCI 2012. Lecture Notes in Computer Science(), vol 7653. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34630-9_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34630-9_52

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34629-3

  • Online ISBN: 978-3-642-34630-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics