Evaluation method for information security capability of mobile phone user based on behavior ontology under unconscious condition

A security capacity assessment method based on security behavior ontology,was proposed to collect users' be-havior data from their smartphones under unconscious condition to solve the problem of detecting mobile phone users' real existing insecure behaviors.A security behavior ontology was...

Full description

Saved in:
Bibliographic Details
Main Authors: Cheng-cheng MAI, Bo CHEN, Jia-kun ZHOU, Ling YU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2016-10-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016262/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539486600658944
author Cheng-cheng MAI
Bo CHEN
Jia-kun ZHOU
Ling YU
author_facet Cheng-cheng MAI
Bo CHEN
Jia-kun ZHOU
Ling YU
author_sort Cheng-cheng MAI
collection DOAJ
description A security capacity assessment method based on security behavior ontology,was proposed to collect users' be-havior data from their smartphones under unconscious condition to solve the problem of detecting mobile phone users' real existing insecure behaviors.A security behavior ontology was set up for formalizing the phone,message,network and App behavior data of mobile phone users and relevant rules were also set down for determining and associating inse-cure actions.Referring to the notion of attack graph,an insecure behavior detection algorithm was proposed based on behavior association graph for analyzing the paths of insecure behaviors dynamically.Furthermore,a competency model of information security capability assessment was presented for realizing the quantitative evaluation of information secu-rity capability of users.The experiment results prove the effectiveness of present competency model for insecure behavior path detection and security ability assessment.
format Article
id doaj-art-295868c2db4541d5b5d6fb8e26872cfb
institution Kabale University
issn 1000-436X
language zho
publishDate 2016-10-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-295868c2db4541d5b5d6fb8e26872cfb2025-01-14T07:11:16ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2016-10-013715616759706162Evaluation method for information security capability of mobile phone user based on behavior ontology under unconscious conditionCheng-cheng MAIBo CHENJia-kun ZHOULing YUA security capacity assessment method based on security behavior ontology,was proposed to collect users' be-havior data from their smartphones under unconscious condition to solve the problem of detecting mobile phone users' real existing insecure behaviors.A security behavior ontology was set up for formalizing the phone,message,network and App behavior data of mobile phone users and relevant rules were also set down for determining and associating inse-cure actions.Referring to the notion of attack graph,an insecure behavior detection algorithm was proposed based on behavior association graph for analyzing the paths of insecure behaviors dynamically.Furthermore,a competency model of information security capability assessment was presented for realizing the quantitative evaluation of information secu-rity capability of users.The experiment results prove the effectiveness of present competency model for insecure behavior path detection and security ability assessment.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016262/security behavior ontologybehavior analysiscapability assessmentmobile security
spellingShingle Cheng-cheng MAI
Bo CHEN
Jia-kun ZHOU
Ling YU
Evaluation method for information security capability of mobile phone user based on behavior ontology under unconscious condition
Tongxin xuebao
security behavior ontology
behavior analysis
capability assessment
mobile security
title Evaluation method for information security capability of mobile phone user based on behavior ontology under unconscious condition
title_full Evaluation method for information security capability of mobile phone user based on behavior ontology under unconscious condition
title_fullStr Evaluation method for information security capability of mobile phone user based on behavior ontology under unconscious condition
title_full_unstemmed Evaluation method for information security capability of mobile phone user based on behavior ontology under unconscious condition
title_short Evaluation method for information security capability of mobile phone user based on behavior ontology under unconscious condition
title_sort evaluation method for information security capability of mobile phone user based on behavior ontology under unconscious condition
topic security behavior ontology
behavior analysis
capability assessment
mobile security
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016262/
work_keys_str_mv AT chengchengmai evaluationmethodforinformationsecuritycapabilityofmobilephoneuserbasedonbehaviorontologyunderunconsciouscondition
AT bochen evaluationmethodforinformationsecuritycapabilityofmobilephoneuserbasedonbehaviorontologyunderunconsciouscondition
AT jiakunzhou evaluationmethodforinformationsecuritycapabilityofmobilephoneuserbasedonbehaviorontologyunderunconsciouscondition
AT lingyu evaluationmethodforinformationsecuritycapabilityofmobilephoneuserbasedonbehaviorontologyunderunconsciouscondition