Samir Ouchani, Yosr Jarraya, O. Mohamed, M. Debbabi
{"title":"Security estimation in Streaming Protocols","authors":"Samir Ouchani, Yosr Jarraya, O. Mohamed, M. Debbabi","doi":"10.1109/INNOVATIONS.2011.5893863","DOIUrl":null,"url":null,"abstract":"Streaming media protocol-based applications share communication resources with regular Network/Internet traffic. So, they are exposed to any existing security attacks. In the present paper, we measure this relationship between attacks and applications by introducing a probabilistic verification evaluation. Our approach is novel in that, it is based on the concurrency between models. In addition, the performance of these new models are qualitatively and quantitatively evaluated by using the PRISM model checker. The results are promising and characterized by a fairly short evaluation delay and automatic security measurement.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Innovations in Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INNOVATIONS.2011.5893863","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Streaming media protocol-based applications share communication resources with regular Network/Internet traffic. So, they are exposed to any existing security attacks. In the present paper, we measure this relationship between attacks and applications by introducing a probabilistic verification evaluation. Our approach is novel in that, it is based on the concurrency between models. In addition, the performance of these new models are qualitatively and quantitatively evaluated by using the PRISM model checker. The results are promising and characterized by a fairly short evaluation delay and automatic security measurement.