Modeling and vulnerable points analysis for E-commerce transaction system with a known attack

4Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the rapid development of network and mobile terminal, online trading has become more and more widespread. However, E-commerce transaction systems aren’t completely strong due to the openness of network. Some points of a system is vulnerable in the real world and thus they can be utilized by attackers and cheaters. We focus on E-commerce transaction systems with attacks, and propose a kind of Petri nets called VET-net (Vulnerable E-commerce Transaction nets) to model them. A VET-net considers both normal actions belonging to the related system and malicious actions ones such as tampering with a data. Based on VET-net, this paper proposes the concepts of vulnerable points and vulnerable levels in order to describe the cause and levels of vulnerability. And then it uses the dynamic sling method to locate the vulnerable points. A real example is used to illustrate the effectiveness and rationality of our concepts and method.

Cite

CITATION STYLE

APA

Wang, M., Liu, G., Yan, C., & Jiang, C. (2016). Modeling and vulnerable points analysis for E-commerce transaction system with a known attack. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10066 LNCS, pp. 422–436). Springer Verlag. https://doi.org/10.1007/978-3-319-49148-6_35

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free