what-when-how
In Depth Tutorials and Information
vogue. For example in a gang attack, a group of attackers within a community col-
lude to reduce the reputation of the target. hus, the protection of the privacy data
and detecting/mitigating the reputation attacks are challenging problems that need
more sophisticated strategies and more robust models.
he aim of security is to make the system both correct and dependable by han-
dling threats effectively. It has been argued in Reference 6 that dependability plays
a more important role in security research than usually considered. To become a
secure system, the social and technical components in an STN should cooperate
not only for the achievement of production tasks but also for the achievement of
dependability, which is defined by the degree to which the sociotechnical system
behaves in the way it is expected to be [7].
Although technical components perform well on well-defined, predictable, and
repetitive security tasks such as access control, they become complex and expensive
when the requirements of the task are vague and need a lot of flexibilities like abnor-
mal detection. Fortunately, some schemes have been proposed to effectively address
these disadvantages of technical components (such as in Reference 8). hus, despite
the uncertainty induced by the social component, both technical and social measures
are equally important in the role of mitigating the risks and improving the reliability
of a system. Good security in the STN environment must take into consideration the
human element, and designs must incorporate an easy interface to ensure security and
reduce costs for applying security.
TableĀ 11.3 shows the different types of social attacks.
TableĀ 11.3
Classiication of Sociocommunal Attacks
Deflation
attack
Inflation attack
One-on-self
Aggran-
dizement
Inferiority
complex
One-on-one
Shilling
kickback
Vilification
vendetta
One-on-many
Dr. Jekyll & Mr.
Hide
Many-on-one
Praise planting
Godfather
Gang attack
Many-on-many
(intra)
Elite clique
Supra
society
Cultural
cringe
Civil war
Many-on-many
(exo)
Cartel
Mutual
boosting
Reputation
racism
Reputation
war
Source : Javed I. Khan and Sajid S. Shaikh. A phenotype reputation estimation func-
tion and its study of resilience to social attacks. Journal of Network and
Computer Applications Volume 32, Issue 4, Pages 913-924, 2009. Elsevier Ltd.
 
Search WWH ::




Custom Search