Security modeling based on CSP for network protocol

被引:0
|
作者
Xie, Xiaofei [1 ]
Li, Xiaohong [1 ]
Cao, Kunyu [1 ]
Feng, Zhiyong [1 ]
机构
[1] School of Computer Science and Technology, Tianjin University, Tianjin 300072, China
关键词
Constraint satisfaction problems - Gateways (computer networks) - Model checking - Semantics - Network security;
D O I
10.4156/jdcta.vol6.issue1.60
中图分类号
学科分类号
摘要
The secure vulnerabilities of network protocols are likely exploited by malicious users to cause damage even disaster. In the paper we proposed an approach to analyze, model and verify the network protocols using the process algebra CSP. First, extract the basic grammar, semantics and rules by analyzing the network protocol. Model the basic logic structure of the protocol, potential intruders in real environment and security constraints of the protocol as CSP processes; then use model checking techniques to verify the model and find out the vulnerabilities of protocol. With this method we modeled and verified Border Gateway Protocol (BGP). From the result analysis we have found manin- the-middle attack which may arise because of lacking authentication between two interconnected peers.
引用
收藏
页码:496 / 504
相关论文
共 50 条
  • [31] Research of Security Routing Protocol for UAV Communication Network Based on AODV
    Tan, Xiaopeng
    Zuo, Zhen
    Su, Shaojing
    Guo, Xiaojun
    Sun, Xiaoyong
    ELECTRONICS, 2020, 9 (08) : 1 - 18
  • [32] A protocol layer survey of network security
    Harrison, JV
    Berghel, H
    ADVANCES IN COMPUTERS, VOL 64: NEW PROGRAMMING PARADIGMS, 2005, 64 : 109 - 158
  • [33] Security properties and CSP
    Schneider, S
    1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 174 - 187
  • [34] Research on Network Security Protection System based on Dynamic Modeling
    Shu, Fei
    Li, Ming
    Chen, ShuTing
    Wang, Xu
    Li, Feng
    PROCEEDINGS OF 2017 IEEE 2ND INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2017, : 1602 - 1605
  • [35] Checkmate network security modeling
    Apostal, D
    Foote-Lennox, T
    Markham, T
    Dowd, A
    Lu, R
    O'Brien, D
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 214 - 226
  • [36] TII protocol modeling and analysis based on colored Petri network
    Zhou Y.-B.
    Liu G.-X.
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2010, 38 (12): : 29 - 34
  • [37] Stochastic protocol modeling for anomaly based network intrusion detection
    Estevez-Tapiador, JM
    Garcia-Teodoro, P
    Diaz-Verdejo, JE
    IWIA 2003: FIRST IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2003, : 3 - 12
  • [38] General structure of network security protocol and the analysis of its security
    Xie, Dongqing
    Li, Chao
    Zhou, Zhouyi
    Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 2000, 27 (02): : 90 - 94
  • [39] Formal-Based Modeling and Analysis of a Network Communication Protocol for IoT: MQTT Protocol
    Hcine, Jamila
    Ben Hafaiedh, Imene
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON SCIENCES OF ELECTRONICS, TECHNOLOGIES OF INFORMATION AND TELECOMMUNICATIONS (SETIT'18), VOL.2, 2020, 147 : 350 - 360
  • [40] Modeling and Analysis of the Security Protocol in C-DAX Based on Process Algebra
    Liu, Ailun
    Zhu, Huibiao
    Fei, Yuan
    Xiang, Shuangqing
    Lu, Gang
    Xie, Wanling
    2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2017, : 39 - 44