Security Protocol For Distributed Networks using Formal Method Specification

被引:0
|
作者
Nandewal, Arun [1 ]
Mahendra, Deepesh [1 ]
Chandrasekaran, K. [1 ]
机构
[1] Natl Inst Technol Karnataka, Surathkal, Karnataka, India
关键词
Denial of Service; protocol; formal method; distributed networks;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Denial of service is becoming a growing concern. As our systems communicate more and more with others that we know less and less, they become increasingly vulnerable to hostile intruders who may take advantage of the very protocols intended for the establishment and authentication of communication to tie up our resources and disable our servers. Since these attacks occur before parties are authenticated to each other, we cannot rely upon enforcement of the appropriate access control policy to protect us. Instead we must build our defenses, as much as possible, into the protocols themselves. This paper shows how some principles that have already been used to make protocols more resistant to denial of service can be specified and verified. We specify a protocol for distributed networks and specify, verify it using general formal methods.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Formal specification and integration of distributed security policies
    Mejri, Mohamed
    Yahyaoui, Hamdi
    [J]. COMPUTER LANGUAGES SYSTEMS & STRUCTURES, 2017, 49 : 1 - 35
  • [2] Formal specification and security verification of the IDKE protocol using FDR model checking
    Soltwisch, R
    Tegeler, F
    Hogrefe, D
    [J]. 2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, : 329 - 334
  • [3] Security Requirements Specification: A Formal Method Perspective
    Mishra, Aditya Dev
    Mustafa, K.
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM-2020), 2019, : 113 - 117
  • [4] A formal specification and method for MAS as a distributed system
    Qi, Y
    Wang, X
    Yan, W
    Mao, XJ
    Qi, ZC
    [J]. ADVANCED PARALLEL PROCESSING TECHNOLOGIES, PROCEEDINGS, 2003, 2834 : 189 - 193
  • [5] Formal Specification of Spanning Tree Protocol Using ACP
    Juan Roig, Pedro
    Alcaraz, Salvador
    Gilly, Katja
    [J]. ELEKTRONIKA IR ELEKTROTECHNIKA, 2017, 23 (02) : 84 - 91
  • [6] Estimating protocol performance using a formal specification model
    Miller, RE
    Chaudhry, ZU
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 1999, 12 (5-6) : 325 - 347
  • [7] Towards a formal specification method for enterprise information system security
    Sengupta, Anirban
    Barik, Mridul Sankar
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 373 - +
  • [8] Formal specification of a protocol processor
    Westerlund, T
    Plosila, J
    [J]. EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, 2005, 3553 : 122 - 131
  • [9] Formal Theory for Security Protocol Analysis of Distributed Denial of Service
    Jiang, Rui
    Bhargava, Bharat
    [J]. INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2014, 5 (03): : 233 - 248
  • [10] A Formal Executable Specification of the GinMAC Protocol for Wireless Sensor Actuator Networks
    Somappa, Admar Ajith Kumar
    Kristensen, Lars Michael
    Ovsthus, Knut
    [J]. 2013 INTERNATIONAL SYMPOSIUM ON WIRELESS AND PERVASIVE COMPUTING (ISWPC), 2013,