Security modeling based on CSP for network protocol

被引:0
|
作者
Xie, Xiaofei [1 ]
Li, Xiaohong [1 ]
Cao, Kunyu [1 ]
Feng, Zhiyong [1 ]
机构
[1] School of Computer Science and Technology, Tianjin University, Tianjin 300072, China
关键词
Constraint satisfaction problems - Gateways (computer networks) - Model checking - Semantics - Network security;
D O I
10.4156/jdcta.vol6.issue1.60
中图分类号
学科分类号
摘要
The secure vulnerabilities of network protocols are likely exploited by malicious users to cause damage even disaster. In the paper we proposed an approach to analyze, model and verify the network protocols using the process algebra CSP. First, extract the basic grammar, semantics and rules by analyzing the network protocol. Model the basic logic structure of the protocol, potential intruders in real environment and security constraints of the protocol as CSP processes; then use model checking techniques to verify the model and find out the vulnerabilities of protocol. With this method we modeled and verified Border Gateway Protocol (BGP). From the result analysis we have found manin- the-middle attack which may arise because of lacking authentication between two interconnected peers.
引用
收藏
页码:496 / 504
相关论文
共 50 条
  • [21] Research on the optimization of communication protocol in network security protocol
    Sun, Daoyuan
    SOFT COMPUTING, 2022, 26 (16) : 7959 - 7966
  • [22] Research on the optimization of communication protocol in network security protocol
    Daoyuan Sun
    Soft Computing, 2022, 26 : 7959 - 7966
  • [23] USP: Modeling security protocol with UMLLL
    Li, Zhitang
    Xie, Yunfeng
    Li, Weiming
    NETWORK ARCHITECTURES, MANAGEMENT, AND APPLICATIONS IV, 2006, 6354
  • [24] A formalism for visual security protocol modeling
    McDermott, J.
    Allwein, G.
    JOURNAL OF VISUAL LANGUAGES AND COMPUTING, 2008, 19 (02): : 153 - 181
  • [25] The design and implementation of Web network security system based on SSL protocol
    Tan, Xianru
    FUTURE INFORMATION TECHNOLOGY, 2011, 13 : 539 - 543
  • [26] Network Protocol Security Analysis Based on Abstract Principle and Model Detection
    Wang, Xiao-Nan
    Fu, Jin-Xuan
    Yu, Hong-Fang
    Sun, Gang
    Chen, Hai-Bing
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2021, 44 (02): : 40 - 46
  • [27] On the security of wireless network protocol 802.11
    Sun, Hong
    Yang, Yi-Xian
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2003, 31 (07): : 1098 - 1100
  • [28] A model-based approach to the security testing of network protocol implementations
    Allen, William H.
    Dou, Chin
    Marin, Gerald A.
    31ST IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2006, : 1008 - +
  • [29] Research on Mobile Network Payment Security Protocol based on Symmetric Cryptography
    Wang Linjing
    Zhang Peijiang
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 236 - 240
  • [30] The design and implementation of Web network security system based on SSL protocol
    Tan, Xianru
    FUTURE INFORMATION TECHNOLOGY, 2011, 13 : 285 - 289