Graphical event model learning and verification for security assessment

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The main objective of our work is to assess the security of a given real world system by verifying whether this system satisfies given properties and, if not, how far it is from satisfying them. We are interested in performing formal verification of this system based on event sequences collected from its execution. In this paper, we propose a preliminary model-based approach where a Graphical Event Model (GEM), learned from the event streams, is considered to be representative of the underlying system. This model is then used to check a certain security property. If the property is not verified, we also propose a search methodology to find another close model that satisfies it. Our approach is generic with respect to the verification procedure and the notion of distance between models. For the sake of completeness, we propose a distance measure between GEMs that allows to give an insight on how far our real system is from verifying the given property. The interest of this approach is illustrated with a toy example.

Cite

CITATION STYLE

APA

Antakly, D., Delahaye, B., & Leray, P. (2019). Graphical event model learning and verification for security assessment. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11606 LNAI, pp. 245–252). Springer Verlag. https://doi.org/10.1007/978-3-030-22999-3_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free