A Distributed Monitoring Approach for Trust Assessment Based on Formal Testing

Communications systems are growing in use and in popularity. While their interactions are becoming more numerous, trust those interactions now becomes a priority. In this paper, we focus on trust management systems based on observations of trustee behaviors. Based on a formal testing methodology, we propose a formal distributed network monitoring approach to analyze the packets exchanged between the trust or, trustee and other points of observation in order to prove the trustee is acting in a trustworthy manner. Based on formal "trust properties", the monitored systems behaviors provide a verdict of trust by analyzing and testing those properties. Finally, our methodology is applied to a real industrial DNS use case scenario.

[1]  Nora Cuppens-Boulahia,et al.  XeNA: an access negotiation framework using XACML , 2009, Ann. des Télécommunications.

[2]  Joan Feigenbaum,et al.  REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.

[3]  Morris Sloman,et al.  Trust Management Tools for Internet Applications , 2003, iTrust.

[4]  David L. Mills,et al.  Internet time synchronization: the network time protocol , 1991, IEEE Trans. Commun..

[5]  Stéphane Maag,et al.  A Formal Data-Centric Approach for Passive Testing of Communication Protocols , 2013, IEEE/ACM Transactions on Networking.

[6]  David Lee,et al.  Network protocol system monitoring-a formal approach with passive testing , 2006, IEEE/ACM Transactions on Networking.

[7]  Hassan Takabi,et al.  DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).

[8]  Ana R. Cavalli,et al.  A passive conformance testing approach for a MANET routing protocol , 2009, SAC '09.

[9]  Ana Cavalli,et al.  Control Model in Multi-Organization Environments , 2012 .

[10]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[11]  Trevor Jim,et al.  SD3: a trust management system with certified evaluation , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[12]  Christoph Meinel,et al.  A Flexible and Efficient Alert Correlation Platform for Distributed IDS , 2010, 2010 Fourth International Conference on Network and System Security.

[13]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[14]  Stéphane Maag,et al.  A Logic-based Passive Testing Approach for the Validation of Communicating Protocols , 2012, ENASE.

[15]  Guy Pujolle,et al.  An autonomic knowledge monitoring scheme for trust management on mobile ad hoc networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[16]  Yuanzhuo Wang,et al.  Prevent DNS Cache Poisoning Using Security Proxy , 2011, 2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies.