Rule-Based Auditing System for Software Security Assurance

被引:3
|
作者
Jang, Changbok [1 ]
Kim, Jeongseok [1 ]
Jang, Hyokyung [1 ]
Park, Sundo [1 ]
Jang, Bokman [1 ]
Kim, Bonghoi [2 ]
Choi, Euiin [1 ]
机构
[1] Hannam Univ, Dept Comp Engn, Daejeon, South Korea
[2] UBNC Co Ltd, Daejeon, South Korea
关键词
Software security assurance; Software auditing tools; Rule-based; Software vulnerability; Malicious code;
D O I
10.1109/ICUFN.2009.5174311
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We can use information and software of various forms without being restricted for place and time if ubiquitous computing age comes. However, its dysfunction is causing security problems such as outflow of personal information, hacking, diffusion of virus. Specially, dissemination of software that has malicious purpose in ubiquitous computing environment causes serious damage. We have studied about malicious code detection and software vulnerability detection tool to prevent this. But, existent detection tools are not suited to general software, because they are limitative in specification area. In addition, they cannot detect a newly appeared malicious code. We must update pattern of new malicious code, because they use a simple pattern matching technique. In this paper, we propose rule-based auditing system that analyzes structure of target code to solve these problems, define this as rule, and detect malicious codes and software vulnerabilities. Proposed auditing system can construct secure ubiquitous computing environment, because it will be used by a common software audit system that reason about source codes security.
引用
收藏
页码:198 / +
页数:2
相关论文
共 50 条
  • [1] A rule-based security auditing tool for software vulnerability detection
    Lee, Moohun
    Cho, Sunghoon
    Jang, Changbok
    Park, Heeyong
    Choi, Euiin
    [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2006, : 505 - 512
  • [2] Auditing system using rule-based reasoning in ubiquitous computing
    Lee, Moohun
    Clio, Sunghoon
    Chang, Hyokyung
    Jo, Junghee
    Jung, Hoiyoung
    Choi, Euiin
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCES AND ITS APPLICATIONS, PROCEEDINGS, 2008, : 261 - +
  • [3] Rule-based system for vulnerability detection of software
    Cho, Sung-Hoon
    Jang, Chang-Bok
    Lee, Moo-Hun
    Choi, Eui-In
    [J]. Advances in Computational Methods in Sciences and Engineering 2005, Vols 4 A & 4 B, 2005, 4A-4B : 1630 - 1633
  • [4] Research on Fuzzy Rule-Based Reasoning System for CC Quality Assurance
    Lei, Zhufeng
    Su, Wenbin
    Liu, Yu
    Gao, Qi
    Yang, Ladao
    Hu, Qiao
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND BIOMIMETICS (ROBIO), 2018, : 1900 - 1908
  • [5] Standards and Frameworks for Information System Security Auditing and Assurance
    Spremic, Mario
    [J]. WORLD CONGRESS ON ENGINEERING, WCE 2011, VOL I, 2011, : 514 - 519
  • [6] Rule-based systems security model
    Smirnov, M
    [J]. COMPUTER NETWORK SECURITY, 2003, 2776 : 135 - 146
  • [7] A rule-based intrusion alert correlation system for integrated security management
    Lee, SH
    Lee, HH
    Noh, BN
    [J]. COMPUTATIONAL SCIENCE - ICCS 2004, PT 1, PROCEEDINGS, 2004, 3036 : 365 - 372
  • [8] Software combines rule-based system, fuzzy-logic with IEC
    不详
    [J]. CONTROL ENGINEERING, 1998, : 24 - 25
  • [9] Fault detection in Rule-based Software systems
    Wang, D
    Hao, RB
    Lee, D
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2003, 45 (12) : 865 - 871
  • [10] Rule-based Security Monitoring of Containerized Workloads
    Gantikow, Holger
    Reich, Christoph
    Knahl, Martin
    Clarke, Nathan
    [J]. CLOSER: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2019, : 543 - 550