Preview

Proceedings of the Institute for System Programming of the RAS (Proceedings of ISP RAS)

Advanced search

Scalable Evaluation of Distributed On-line Network Monitoring for Behavioral Feedback in Trust Management

https://doi.org/10.15514/ISPRAS-2014-26(6)-11

Abstract

Collaborative systems are growing in use and popularity. The need to boost the methods concerning the interoperability is growing as well; therefore, trustworthy interactions of the different systems are a priority. The decision regarding with whom and how to interact with other users or applications depends on each system. We focus on providing trust verdicts by evaluating the behaviors of different agents, using distributed on-line network monitoring. This will provide trust management systems information regarding a trustee experience, for those trust management systems based on "soft trust". In this work, we propose a scalable evaluation method for any on-line network monitoring system, by using an auxiliary model, an extended finite state automaton (EFSA), and as well as other known methods to reduce the time complexity of the evaluation algorithm.

About the Authors

Jorge Lopez
Institut Mines Telecom, Telecom SudParis CNRS UMR 5157
Russian Federation


Stephane Maag
Institut Mines Telecom, Telecom SudParis CNRS UMR 5157
Russian Federation


Gerardo Morales
RLICT Universidad Galileo
Russian Federation


References

1. T. Grandison, M. Sloman. A survey of trust in internet applications. IEEE Communications Surveys and Tutorials, 2000, vol. 3, no. 4, pp. 2-16.

2. M. Blaze, J. Feigenbaum, J. Lacy. Decentralized trust management. Proc. the IEEE Symposium on Security and Privacy, 1996. pp. 164–173. Oakland, CA, USA.

3. M. Blaze, J. Feigenbaum, A.D. Keromytis. Keynote: Trust management for public-key infrastructures. Proc. the Springer 6th International Workshop of Security Protocols, 1999. pp. 59–63. Cambridge, UK.

4. Y.-H. Chu, J. Feigenbaum, B. Lamacchia, P. Resnick, M. Strauss. Referee: Trust management for web applications. O’Reilly World Wide Web Journal, 1997, vol. 2, no. 3, pp. 127-139.

5. T. Jim. Sd3: A trust management system with certified evaluation. Proc the IEEE Symposium on Security and Privacy, 2001. pp. 106–115. Oakland, California, USA.

6. A. J. Lee, M. Winslett, K. J. Perano. Trustbuilder2: A reconfigurable framework for trust negotiation. Proc. the Third IFIP WG 11.11 International Conference, 2009. pp. 176–195. West Lafayette, IN, USA.

7. Z. Movahedi, M. Nogueira, G. Pujolle. An autonomic knowledge monitoring scheme for trust management on mobile ad hoc networks. Proc. the IEEE Wireless Communications and Networking Conference, 2012. pp. 1898–1903. Paris, France.

8. G. Holzmann. The spin model checker : primer and reference manual. Addison-Wesley Professional. 2003, pp. 1-596.

9. M.-N. Irfan, C. Oriat, R. Groz. Model inference and testing. Elsevier Advances in Computers, 2013, vol. 89, pp. 89-139.

10. D. Lee, R. Miller. Network protocol system monitoring-a formal approach with passive testing. IEEE/ACM Transactions on Networking, 2006, vol. 14, no. 2, pp. 424-437.

11. A. R. Cavalli, S. Maag, E. M. de Oca. A passive conformance testing approach for a manet routing protocol. Proc. the ACM Symposium on Applied Computing (SAC), 2009. pp. 207–2011. Honolulu, Hawaii, USA.

12. X. Che, F. Lalanne, S. Maag. A logic-based passive testing approach for the validation of communicating protocols. Proc. the 7th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE), 2012. pp. 53–64. Wroclaw, Poland.

13. X. Che, J. Lopez, S. Maag, G. Morales. Testing trust properties using a formal distributed network monitoring approach. Springer Annals of telecommunications - Annales des télécommunications, 2014. pp. 1-11. doi: 10.1007/s12243-014-0454-3.

14. D. L. Mills. Internet time synchronization: the network time protocol. IEEE Transactions on Communications, 1991, vol. 39, no. 10, pp. 1482-1493.

15. P. V. Mockapetris, RFC 1035 Domain names — implementation and specification. Internet Engineering Task Force, 1987.

16. J. López, X. Che, S. Maag. An online passive testing approach for communication protocols. Proc. the 9th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE), 2014. pp. 136–143. Lisbon, Portugal.

17. R. Smith, C. Estan, S. Jha, S. Kong .Deflating the big bang: Fast and scalable deep packet inspection with extended finite automata. Proc. Conference on Data Communication, SIGCOMM ’08, 2008. pp. 207–218. New York, NY, USA.

18. M. Becchi, C. Wiseman, P. Crowley. Evaluating regular expression matching engines on network and general purpose processors. Proc. The 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2009. pp. 30–39. New York, NY, USA.


Review

For citations:


Lopez J., Maag S., Morales G. Scalable Evaluation of Distributed On-line Network Monitoring for Behavioral Feedback in Trust Management. Proceedings of the Institute for System Programming of the RAS (Proceedings of ISP RAS). 2014;26(6):125-140. (In Russ.) https://doi.org/10.15514/ISPRAS-2014-26(6)-11



Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2079-8156 (Print)
ISSN 2220-6426 (Online)