Security modeling based on CSP for network protocol

被引:0
|
作者
Xie, Xiaofei [1 ]
Li, Xiaohong [1 ]
Cao, Kunyu [1 ]
Feng, Zhiyong [1 ]
机构
[1] School of Computer Science and Technology, Tianjin University, Tianjin 300072, China
关键词
Constraint satisfaction problems - Gateways (computer networks) - Model checking - Semantics - Network security;
D O I
10.4156/jdcta.vol6.issue1.60
中图分类号
学科分类号
摘要
The secure vulnerabilities of network protocols are likely exploited by malicious users to cause damage even disaster. In the paper we proposed an approach to analyze, model and verify the network protocols using the process algebra CSP. First, extract the basic grammar, semantics and rules by analyzing the network protocol. Model the basic logic structure of the protocol, potential intruders in real environment and security constraints of the protocol as CSP processes; then use model checking techniques to verify the model and find out the vulnerabilities of protocol. With this method we modeled and verified Border Gateway Protocol (BGP). From the result analysis we have found manin- the-middle attack which may arise because of lacking authentication between two interconnected peers.
引用
收藏
页码:496 / 504
相关论文
共 50 条
  • [1] Modeling of Wireless Network Security Authentication Protocol Based on SPIN
    Zhou Li
    Tan Fang-yong
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 1892 - 1897
  • [2] Network Protocol Security Testing Based on Fuzz
    Li Haifeng
    Wang Shaolei
    Zhang Bin
    Shuai Bo
    Tang Chaojing
    PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 955 - 958
  • [3] Modeling and Verifying the Ariadne Protocol Using CSP
    Wu, Xi
    Liu, Si
    Zhu, Huibiao
    Zhao, Yongxin
    Chen, Lei
    2012 IEEE 19TH INTERNATIONAL CONFERENCE AND WORKSHOPS ON ENGINEERING OF COMPUTER BASED SYSTEMS (ECBS), 2012, : 24 - 32
  • [4] Optimization design of encryption protocol in network security protocol based on wireless network development
    Zhang, Ming
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (05) : 6099 - 6106
  • [5] Formal modeling and security analysis method of security protocol based on CPN
    Gong X.
    Feng T.
    Du J.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (09): : 240 - 253
  • [6] SPIN-based security protocol modeling and analysis
    Chen, Chunling
    Tian, Guoliang
    Nanjing Hangkong Hangtian Daxue Xuebao/Journal of Nanjing University of Aeronautics and Astronautics, 2009, 41 (05): : 672 - 676
  • [7] A Lightweight Authentication Protocol for Network Security Based on PUF
    Xu, Zhao-Hui
    International Journal of Network Security, 2023, 25 (05) : 777 - 783
  • [8] Modeling and Verifying the TTCAN Protocol Using Timed CSP
    Ran, Qinwen
    Wu, Xi
    Li, Xin
    Shi, Jianqi
    Guo, Jian
    Zhu, Huibiao
    2014 THEORETICAL ASPECTS OF SOFTWARE ENGINEERING CONFERENCE (TASE), 2014, : 90 - 97
  • [9] Security authentication protocol for WiMAX wireless network based on protocol composition logic
    Feng T.
    Zhang Z.-B.
    Ma J.-F.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2010, 32 (09): : 2106 - 2111
  • [10] A new security protocol modeling approach based on πt calculus
    Han, Jin
    Cai, Shengwen
    Wang, Chongjun
    Lai, Haiguang
    Xie, Junyuan
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2010, 47 (04): : 613 - 620