Auditing system using rule-based reasoning in ubiquitous computing

被引:0
|
作者
Lee, Moohun [1 ]
Clio, Sunghoon [1 ]
Chang, Hyokyung [1 ]
Jo, Junghee [1 ]
Jung, Hoiyoung [2 ]
Choi, Euiin [1 ]
机构
[1] Hannam Univ, Dept Comp Engn, Taejon, South Korea
[2] UBNC Co Ltd, Taejon, South Korea
关键词
D O I
10.1109/ICCSA.2008.56
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
We can use information and software of various forms without being restricted for place and time if ubiquitous computing age comes. However, its dysfunction is causing securitiy problems such as oldflow of personal information, hacking, diffusion of virus. Specially dissemination of software that has malicious purpose in ubiquitous computing environment causes serious damage. We have studied about malicious code detection and software vulnerability detection tool to prevent this. But, existent detection tools are not suited to general software, because they are limitative in specification area. In addition, they can not detect a newly appeared malicious code. We must update pattern of new matching code, because they use a simple pattern matching technique. In this paper, we propose rule-based auditings system that analyzes structure of target code to solve these problems, define this as rule, and detect malicious codes and software vulnerabilities. Proposed auditing system can construct secure ubiquitous computing environment, because it will be using by a common software audit system that reason about source codes security.
引用
收藏
页码:261 / +
页数:3
相关论文
共 50 条
  • [1] Ubiquitous computing using rule-based I/O control devices
    Terada, T
    Tsukamoto, M
    Hayakawa, K
    Kashitani, A
    [J]. NEC RESEARCH & DEVELOPMENT, 2003, 44 (04): : 321 - 327
  • [2] A rule-based publish-subscribe message routing system for ubiquitous computing
    Jing, Yixin
    Jeong, Dongwon
    Kim, JinHyung
    Baik, Doo-Kwon
    [J]. UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2006, 4239 : 1 - 12
  • [3] A rule-based RFID tag system using ubiquitous chips
    Yoshihisa, T
    Kishino, Y
    Terada, T
    Tsukamoto, M
    Sagara, R
    Sukenari, T
    Taguchi, D
    Nishio, S
    [J]. PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON ACTIVE MEDIA TECHNOLOGY (AMT 2005), 2005, : 423 - 428
  • [4] Ubiquitous chip: A rule-based I/O control device for ubiquitous computing
    Terada, T
    Tsukamoto, M
    Hayakawa, K
    Yoshihisa, T
    Kishino, Y
    Kashitani, A
    Nishio, S
    [J]. PERVASIVE COMPUTING, PROCEEDINGS, 2004, 3001 : 238 - 253
  • [5] A ubiquitous education support method based on analysis of learning patterns using Rule-Based Reasoning
    Sun, Shengguo
    Kansen, Mizuo
    Han, Qiu
    Huang, Tongjun
    He, Aiguo
    Cheng, Zixue
    [J]. 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS, 2006, : 663 - +
  • [6] Rule-Based Auditing System for Software Security Assurance
    Jang, Changbok
    Kim, Jeongseok
    Jang, Hyokyung
    Park, Sundo
    Jang, Bokman
    Kim, Bonghoi
    Choi, Euiin
    [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2009, : 198 - +
  • [7] A kind of mixing reasoning in rule-based system
    Liu, Q
    Yin, GS
    Zhang, JP
    Liu, J
    Liu, DX
    [J]. INFORMATION INTELLIGENCE AND SYSTEMS, VOLS 1-4, 1996, : 1436 - 1441
  • [8] Using Rule-Based Reasoning for RDF Validation
    Arndt, Dorthe
    De Meester, Ben
    Dimou, Anastasia
    Verborgh, Ruben
    Mannens, Erik
    [J]. RULES AND REASONING, 2017, 10364 : 22 - 36
  • [9] Convolutional rule inference network based on belief rule-based system using an evidential reasoning approach
    Diao, Hongyue
    Lu, Yifan
    Deng, Ansheng
    Zou, Li
    Li, Xiaofeng
    Pedrycz, Witold
    [J]. KNOWLEDGE-BASED SYSTEMS, 2022, 237
  • [10] Environmental investment prediction using extended belief rule-based system and evidential reasoning rule
    Yang, Long-Hao
    Wang, Suhui
    Ye, Fei-Fei
    Liu, Jun
    Wang, Ying-Ming
    Hu, Haibo
    [J]. JOURNAL OF CLEANER PRODUCTION, 2021, 289