Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols

来源 :Journal of Computer Science & Technology | 被引量 : 0次 | 上传用户:shevafans
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Denial-of-Service(DoS) attacks are virulent to both computer and networked systems.Modeling and evaluating DoS attacks are very important issues to networked systems;they provide both mathematical foundations and theoretic guidelines to security system design.As defense against DoS has been built more and more into security protocols,this paper studies how to evaluate the risk of DoS in security protocols.First,we build a formal framework to model protocol operations and attacker capabilities.Then we propose an economic model for the risk evaluation.By characterizing the intruder capability with a probability model,our risk evaluation model specifies the“Value-at-Risk”(VaR) for the security protocols.The“Value-at-Risk”represents how much computing resources are expected to lose with a given level of confidence.The proposed model can help users to have a better understanding of the protocols they are using,and in the meantime help designers to examine their designs and get clues of improvement.Finally we apply the proposed model to analyze a key agreement protocol used in sensor networks and identify a DoS flaw there,and we also validate the applicability and effectiveness of our risk evaluation model by applying it to analyze and compare two public key authentication protocols. Denial-of-Service (DoS) attacks are virulent to both computer and networked systems. Model and metrics DoS attacks are very important issues to networked systems; they provide both mathematical foundations and theoretic guidelines to security system design. As defense against DoS has been built more and more into security protocols, this paper studies how to evaluate the risk of DoS in security protocols. First, we build a formal framework to model protocol operations and attacker capabilities. If we propose an economic model for the risk evaluation.By characterizing the intruder capability with a probability model, our risk evaluation model, is “value-at-Risk” (VaR) for the security protocols.The “Value-at-Risk” means how much computing resources are expected to lose with a given level of confidence.The proposed model can help users to have a better understanding of the protocols they are using, and in the meantime help designers to examine their designs and get clues of improvement.Finally we apply the proposed model to analyze a key agreement protocol used in sensor networks and identify a DoS flaw there, and we also validate the applicability and effectiveness of our risk evaluation model by applying it to analyze and compare two public key authentication protocols .
其他文献
职业技能鉴定是职业资格证书制度的实施环节,题库是职业技能鉴定的重要技术资源,题库的运行管理水平切实关系到职业技能鉴定的质量和国家职业资格证书的公信力和权威性。江苏
语文课堂教学是教师的“教”与学生的“学”的互动的过程。加强师生间的良好互动有利于提高语文课堂的教学效率。值得一提的是,语文课程也要根据学生的身心发展和语文学习的
目的:探讨应用金荞麦片结合培菲康治疗慢性结肠炎的临床疗效及安全性。方法:选择72例患者,随机分成两组,观察组36例采用金荞麦片结合培菲康治疗;对照组36例则使用氟哌酸治疗,
为保证《神州学人》杂志海外发行地址准确性,编辑部从本期始刊出《神州学人》杂志海外邮寄地址变更反馈表,请海外各使(领)馆教育处(组)及中国学联及专业协会将变更的邮发地址
提问一直以来是课堂教学中的重要方式,如何提高课堂提问有效性一直是广大教师普遍关注的问题。本文则对小学数学教学中的提问方式加以分析。 Questioning has always been a
基于网络的入侵检测系统是一种积极主动的安全防护措施之一。本文在明确入侵检测系统重要性的基础上,分析了典型的网络入侵过程,并进一步详细研究了入侵检测系统的设计,主要
第一次这么深刻地回望往事,回望当初16岁那个一脸倔强的懵懂少年。16岁,心底已然明确自己的人生目标,想成为一个作家。可能是无知者无畏吧,总觉得年轻的自己豪情万丈,只要爬
太阳早已在山间等待着下落,却似乎特意为爷爷和老单车驻留停足;路旁的野菊花在阳光下灼灼地期盼,不舍地摇曳在阴影与余晖间,期待着下一轮洒下的光阴。一天一天,一年一年,爷爷
第六章自主创新长入区域产业的微观基础当代科学知识的快速进步,归之于市场体制为基础的现代知识牛产的快速发展。面对一体化浪潮席卷全球和区际竞争日趋激烈的新形势,推动自
请下载后查看,本文暂不支持在线获取查看简介。 Please download to view, this article does not support online access to view profile.