Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Simulating malicious users in a software reputation system
Responsible organisation
2011 (English)In: Communications in Computer and Information Science, Springer , 2011, Vol. 186, 147-156 p.Conference paper, (Refereed) Published
Abstract [en]

Today, computer users have trouble in separating malicious and legitimate software. Traditional countermeasures such as anti-virus tools mainly protect against truly malicious programs, but the situation is complicated due to a "grey-zone" of questionable programs that are difficult to classify. We therefore suggest a software reputation system (SRS) to help computer users in separating legitimate software from its counterparts. In this paper we simulate the usage of a SRS to investigate the effects that malicious users have on the system. Our results show that malicious users will have little impact on the overall system, if kept within 10% of the population. However, a coordinated attack against a selected subset of the applications may distort the reputation of these applications. The results also show that there are ways to detect attack attempts in an early stage. Our conclusion is that a SRS could be used as a decision support system to protect against questionable software.

Place, publisher, year, edition, pages
Springer , 2011. Vol. 186, 147-156 p.
Keyword [en]
reputation system attacks, simulation, Software reputation system
National Category
Software Engineering
Identifiers
URN: urn:nbn:se:bth-7379DOI: 10.1007/978-3-642-22339-6_18ISI: 000306579800018Local ID: oai:bth.se:forskinfo1AA064CBAC9D6A4CC12579790033C467OAI: oai:DiVA.org:bth-7379DiVA: diva2:834987
Conference
8th FTRA International Conference on Secure and Trust Computing, Data Management, and Application, STA
Available from: 2012-09-18 Created: 2012-01-02 Last updated: 2017-02-22Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full text

Search in DiVA

By author/editor
Borg, AntonBoldt, MartinCarlsson, Bengt
Software Engineering

Search outside of DiVA

GoogleGoogle Scholar

Altmetric score

Total: 41 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf