Security modeling based on CSP for network protocol

被引:0
|
作者
Xie, Xiaofei [1 ]
Li, Xiaohong [1 ]
Cao, Kunyu [1 ]
Feng, Zhiyong [1 ]
机构
[1] School of Computer Science and Technology, Tianjin University, Tianjin 300072, China
关键词
Constraint satisfaction problems - Gateways (computer networks) - Model checking - Semantics - Network security;
D O I
10.4156/jdcta.vol6.issue1.60
中图分类号
学科分类号
摘要
The secure vulnerabilities of network protocols are likely exploited by malicious users to cause damage even disaster. In the paper we proposed an approach to analyze, model and verify the network protocols using the process algebra CSP. First, extract the basic grammar, semantics and rules by analyzing the network protocol. Model the basic logic structure of the protocol, potential intruders in real environment and security constraints of the protocol as CSP processes; then use model checking techniques to verify the model and find out the vulnerabilities of protocol. With this method we modeled and verified Border Gateway Protocol (BGP). From the result analysis we have found manin- the-middle attack which may arise because of lacking authentication between two interconnected peers.
引用
收藏
页码:496 / 504
相关论文
共 50 条
  • [41] Formal Proof of the Security Protocol in Wireless Sensor Network Based on the Petri Net
    Guo, Yingjiu
    Liu, Xuemei
    Shao, Xiufeng
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 668 - 672
  • [42] Security model and authentication protocol in EPON-based optical access network
    Roh, SS
    Kim, SH
    ICTON 2003: 5TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOL 1, PROCEEDINGS, 2003, : 99 - 102
  • [43] Security of Neural Network-Based Key Agreement Protocol for Smart Grids
    Stypinski, Milosz
    Niemiec, Marcin
    ENERGIES, 2023, 16 (10)
  • [44] Security Analysis on Railway Network Time Protocol Based on Colored Petri Nets
    Zhang Y.
    Zhang H.
    Wang H.
    Tiedao Xuebao/Journal of the China Railway Society, 2017, 39 (10): : 82 - 88
  • [45] A Model-based Approach to Security Flaw Detection of Network Protocol Implementations
    Hsu, Yating
    Shu, Guoqiang
    Lee, David
    16TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS: ICNP'08, 2008, : 114 - 123
  • [46] Security Mechanism Analysis of Wireless Local Area Network Based on WEP Protocol
    Cao, Zaihui
    Yu, Dongxian
    Wu, Qingtao
    3RD INTERNATIONAL CONFERENCE ON APPLIED ENGINEERING, 2016, 51 : 751 - 756
  • [47] A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace a nd Security Protocol Implementation Ontology
    He, Xudong
    Liu, Jiabing
    Huang, Chin-Tser
    Wang, Dejun
    Meng, Bo
    IEEE ACCESS, 2019, 7 : 131050 - 131067
  • [48] MODELING ADVERSARIES IN A LOGIC FOR SECURITY PROTOCOL ANALYSIS
    Halpern, Joseph Y.
    Pucella, Riccardo
    LOGICAL METHODS IN COMPUTER SCIENCE, 2012, 8 (01)
  • [49] Based on social network theory security identity authentication protocol research on MANET
    Niu, Jie
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA AND SMART CITY (ICITBS), 2016, : 160 - 163
  • [50] A Modeling Framework for Generating Security Protocol Specifications
    Bela, Genge
    Piroska, Haller
    PROCEEDINGS OF THE 10TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING, 2009, : 362 - 365