{"title":"A Risk Assessment Method based on Software Behavior","authors":"G. Chen, Kun Wang, Jian Tan, Xiaoyong Li","doi":"10.1109/ISI.2019.8823394","DOIUrl":null,"url":null,"abstract":"Traditional risk assessment methods have problems with the subjectivity of assessors and inaccuracy of vulnerability detection, which leads to unreliable and non-quantitative assessment results. To address these problems, this paper proposed a method to assess system risk based on software behavior. The behavior of untrusted software calling is necessarily associated with system risk, specifically, the larger the number and scope of untrusted software called, the higher risk the system faces, and vice versa. In other words, illegal operation of computers is the specific form of system risk and there is a probabilistic correlation between them. Because the number and scope of untrusted software calling can be accurately measured while risk level cannot be observed directly, this paper used a quantitative analysis method (HMM) to assess the system risk level, which ensures objectivity and accuracy of results. Furthermore, this paper analyzed and explained the risk assessment method based on software behavior through experiments.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISI.2019.8823394","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Traditional risk assessment methods have problems with the subjectivity of assessors and inaccuracy of vulnerability detection, which leads to unreliable and non-quantitative assessment results. To address these problems, this paper proposed a method to assess system risk based on software behavior. The behavior of untrusted software calling is necessarily associated with system risk, specifically, the larger the number and scope of untrusted software called, the higher risk the system faces, and vice versa. In other words, illegal operation of computers is the specific form of system risk and there is a probabilistic correlation between them. Because the number and scope of untrusted software calling can be accurately measured while risk level cannot be observed directly, this paper used a quantitative analysis method (HMM) to assess the system risk level, which ensures objectivity and accuracy of results. Furthermore, this paper analyzed and explained the risk assessment method based on software behavior through experiments.