Detecting collusion attacks in security protocols

被引:0
|
作者
Chen, QF [1 ]
Chen, YPP
Zhang, SC
Zhang, CQ
机构
[1] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3128, Australia
[2] Univ Technol Sydney, Fac Informat Technol, Sydney, NSW 2007, Australia
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security protocols have been widely used to safeguard secure electronic transactions. We usually assume that principals are credible and shall not maliciously disclose their individual secrets to someone else. Nevertheless, it is impractical to completely ignore the possibility that some principals may collude in private to achieve a fraudulent or illegal purpose. Therefore, it is critical to address the possibility of collusion attacks in order to correctly analyse security protocols. This paper proposes a framework by which to detect collusion attacks in security protocols. The possibility of security threats from insiders is especially taken into account. The case study demonstrates that our methods are useful and promising in discovering and preventing collusion attacks.
引用
收藏
页码:297 / 306
页数:10
相关论文
共 50 条
  • [31] Performance Analysis of Security Attacks and Improvements of Routing Protocols in MANET
    Singh, Kuldeep
    Boparai, Amanat
    Handa, Vrinda
    Rani, Sudesh
    2015 SECOND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE, COMPUTER ENGINEERING, AND SOCIAL MEDIA (CSCESM), 2015, : 163 - 169
  • [32] A formal analysis of complex type flaw attacks on security protocols
    Gao, Han
    Bodei, Chiara
    Degano, Pierpaolo
    ALGEBRAIC METHODOLOGY AND SOFTWARE TECHNOLOGY, PROCEEDINGS, 2008, 5140 : 167 - +
  • [33] Novel MITM Attacks on Security Protocols in SDN: A Feasibility Study
    Wang, Xin
    Gao, Neng
    Zhang, Lingchen
    Liu, Zongbin
    Wang, Lei
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016, 2016, 9977 : 455 - 465
  • [34] Collusion analysis of cryptographic protocols
    Low, SH
    Maxemchuk, NF
    IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1 - 5
  • [35] Fingerprints resistant to collusion attacks
    Solovev, T. M.
    Chernyak, R., I
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2012, 15 (01): : 60 - 68
  • [36] No-Match Attacks and Robust Partnering Definitions - Defining Trivial Attacks for Security Protocols is Not Trivial
    Li, Yong
    Schaege, Sven
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1343 - 1360
  • [37] SPHINX: Detecting Security Attacks in Software-Defined Networks
    Dhawan, Mohan
    Poddar, Rishabh
    Mahajan, Kshiteej
    Mann, Vijay
    22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [38] SECURITY SYSTEM FOR DETECTING TAMPERING AND THERMAL SIDE CHANNEL ATTACKS
    Vasile, Daniel Ciprian
    Svasta, Paul
    UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2020, 82 (04): : 161 - 172
  • [39] A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device
    Xu, Bin
    Wang, Weike
    Hao, Qiang
    Zhang, Zhun
    Du, Pei
    Xia, Tongsheng
    Li, Hongge
    Wang, Xiang
    IEEE ACCESS, 2018, 6 : 72862 - 72869
  • [40] Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET
    Gaikwad , Vaishali
    Ragha, Lata
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 306 - 311