DEVELOPMENT OF SCENARIO MODELING OF CONFLICT TOOLS IN A SECURITY SYSTEM BASED ON FORMAL GRAMMARS
Creators
- 1. Simon Kuznets Kharkiv National University of Economics
- 2. Ivan Kozhedub Kharkiv National Air Force University
- 3. Flight Academy of the National Aviation University
- 4. Ivan Chernyakhovsky National Defense University of Ukraine
- 5. Institute of Special Communication and Information Security of National Technical University of Ukraine "Igor Sikorsky Kiev Polytechnic Institute"
- 6. Chernihiv National University of Technology
Description
The results of the development of tools for scenario modeling based on formal grammars are presented. The works related to various ways of scenario description in their development systems are analyzed. For the natural language description of scenarios, it is indicated that this approach is sufficiently transparent and understandable for users. However, this approach has several disadvantages for formalizing and unifying scenario description. In particular, the presence of a number of ambiguities in the language makes it impossible for the description to be uniquely interpreted, and as a result, unsuitable for performing formal transformations on the description. The graphical representation of the script is a visual representation of the script. Moreover, the visual representation of the scenario in the form of some automaton model can be estimated as extremely attractive for subsequent multi-agent modeling of its execution. The disadvantage of such scenario description is still the difficulty of performing formal manipulations and the need to switch to a more convenient representation for manipulations. Using formal grammars to describe scenarios is a compromise approach that allows scripts to be described in an unambiguously interpreted form. The formal grammar description is also more familiar to computer language specialists. In addition, there are programs focused on working with formal grammars. The transition from the natural linguistic description of scenarios to its formal representation as a standard description in the Backus-Naura form is shown. The change in the presentation form was made using the example of description of the scenario of behavior of cyber-conflict participants in the security system. The resulting script description was used in the context-free grammar analyzer. The results showed the applicability of the proposed approach and the tools used to describe and verify the description correctness of scenarios related to any subject area
Files
Development of scenario modeling of conflict tools in a security system based on formal grammars.pdf
Files
(596.7 kB)
Name | Size | Download all |
---|---|---|
Development of scenario modeling of conflict tools in a security system based on formal grammars.pdf
md5:b9e1cb47a55c1dc6762b16a29317985f
|
596.7 kB | Preview Download |
Additional details
References
- Do Prado Leite, J. C. S., Hadad, G. D. S., Doorn, J. H., Kaplan, G. N. (2000). A Scenario Construction Process. Requirements Engineering, 5 (1), 38–61. doi: https://doi.org/10.1007/pl00010342
- Carroll, J. (1995). Introduction: the scenario perspective on system development. Scenario-based design: envisioning work and technology in system development. Wiley, 1–18.
- Potts, C. (1995). Using schematic scenarios to understand user needs. Proceedings of the Conference on Designing Interactive Systems Processes, Practices, Methods, & Techniques - DIS'95, 247–256. doi: https://doi.org/10.1145/225434.225462
- Booch, G. (1992). Object oriented design with applications. Object-oriented software engineering: a use case driven approach. Addison-Wesley, Reading, MA/ACM Press, New York.
- Zorman, L. (1995). Requirements envisaging by utilizing scenarios (Rebus). University of Southern California.
- Rolland, C., Ben Achour, C., Cauvet, C., Ralyté, J., Sutcliffe, A., Maiden, N. et. al. (1998). A proposal for a scenario classification framework. Requirements Engineering, 3 (1), 23–47. doi: https://doi.org/10.1007/bf02802919
- Weidenhaupt, K., Pohl, K., Jarke, M., Haumer, P. (1998). Scenarios in system development: current practice. IEEE Software, 15 (2), 34–45. doi: https://doi.org/10.1109/52.663783
- Ryser, J., Glinz, M. (1999). A Practical Approach to Validating and Testing Software Systems Using Scenarios. Proceeding 3rd International Software Quality Week Europe 1999 QWE'99.
- Devillers, F., Donikian, S. (2003). A Scenario Language to orchestrate Virtual World Evolution. SCA '03 Proceedings of the 2003 ACM SIGGRAPH/Eurographics symposium on Computer animation, 265–275.
- Godet, M., Roubelat, F. (1996). Creating the future: The use and misuse of scenarios. Long Range Planning, 29 (2), 164–171. doi: https://doi.org/10.1016/0024-6301(96)00004-0
- Schwartz, P. (2000). The official future, self-delusion and the value of scenarios. Financial Times, 2.
- Steinitz, C., Arias, H., Bassett, S., Flaxman, M., Goode, T., Maddock III, T. et. al. (2003). Alternative Futures for Changing Landscapes: The Upper San Pedro River Basin in Arizona and Sonora. Island Press, New York.
- Timpe, C., Scheepers, M. J. (2003). A look into the future: scenarios for distributed generation in Europe. Energy research Centre of the Netherlands ECN.
- Maack, J. (2001). Scenario analysis: a tool for task managers. In: Social Development Paper No. 36. Social Analysis: Selected Tools and Techniques. World Bank, Washington, D.C.
- Hulse, D. W., Branscomb, A., Payne, S. G. (2004). Envisioning alternatives: using citizen guidance to map future land and water use. Ecological Applications, 14 (2), 325–341. doi: https://doi.org/10.1890/02-5260
- Anderson, R., Moore, T. (2006). The Economics of Information Security. Science, 314 (5799), 610–613. doi: https://doi.org/10.1126/science.1130992
- Varian, H. (2004). System Reliability and Free Riding. Advances in Information Security, 1–15. doi: https://doi.org/10.1007/1-4020-8090-5_1
- Bohme, R., Moore, T. (2009). The iterated weakest link. A model of adaptive security investment. Workshop on the Economics of Information Security (WEIS). Available at: http://weis09.infosecon.net/files/152/paper152.pdf
- Gordon, L. A., Loeb, M. P., Lucyshyn, W. (2003). Information security expenditures and real options: A wait-and-see approach. Computer Security Journal 14, 1–7.
- Purser, S. A. (2004). Improving the ROI of the security management process. Computers & Security, 23 (7), 542–546. doi: https://doi.org/10.1016/j.cose.2004.09.004
- Grossklags, J., Christin, N., Chuang, J. (2008). Secure or insure? Proceeding of the 17th International Conference on World Wide Web - WWW '08, 209–218. doi: https://doi.org/10.1145/1367497.1367526
- Gordon, L. A., Loeb, M. P. (2002). The economics of information security investment. ACM Transactions on Information and System Security, 5 (4), 438–457. doi: https://doi.org/10.1145/581271.581274
- Zhang, Y., Fan, X., Wang, Y., Xue, Z. (2008). Attack Grammar: A New Approach to Modeling and Analyzing Network Attack Sequences. 2008 Annual Computer Security Applications Conference (ACSAC). doi: https://doi.org/10.1109/acsac.2008.34
- Gorodetski, V., Kotenko, I. (2002). Attacks against Computer Network: Formal Grammar-Based Framework and Simulation Tool. Recent Advances in Intrusion Detection, 219–238. doi: https://doi.org/10.1007/3-540-36084-0_12
- Yevseyev, S. P., Dorokhov, A. V. (2011). Information threats and safety in Ukrainian bank payment systems. Kriminologicheskiy zhurnal baykal'skogo gosudarstvennogo universiteta ekonomiki i prava, 2 (16), 68–75.
- Milov, A. V., Korol', O. G. (2019). Razrabotka ontologii povedeniya vzimodeystvuyushchih agentov v sistemah bezopasnosti. 4th International Congress on 3D Printing (Additive Manufacturing) Technologies and Digital Industry 2019, 832–842.