欢迎来到天天文库
浏览记录
ID:34040944
大小:91.78 KB
页数:6页
时间:2019-03-03
《using csp to model and analyze transmission control protocol vulnerabilities within the bro》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、UsingCSPtoModelandAnalyzeTransmissionControlProtocolVulnerabilitieswithintheBroadcastNetworkHamidRezaShahriari,RasoolJalili¤DepartmentofComputerEngineeringSharifUniversityofTechnologyTehran,IranEmail:shahriari@mehr.sharif.edu,jalili@sharif.eduAbstract—Spreadingnetworksandincreasingtheircomplex-corre
2、ctnessofthegoalsinthemodel.Section2reviewstheityhascomplicatedthetaskofsecurityanalysis.Accordingly,relatedworks.Section3describesourproposedapproach,aautomaticverificationapproacheshavereceivedmoreattentionsimplifiedmodelofTCPaswellasthenetworkofhosts.recently.Inthispaper,wemodeledanetworkincludingas
3、etInsection4weanalyzethemodeltotestsomesecurityofhosts(clientsandservers)usingtheprocessalgebraCSPinordertoverifytheTransmissionControlProtocol(TCP)propertiesandshowcounter-examples.behavioragainstanactiveintruder.ThemodelisverifiedusingtheFDRtoolandasaresult,someattackscenariosviolatingII.RELATEDWOR
4、Kthesecurityarefound.ThescenariosshoweshowanintruderWorkspublishedrelatedtothetopicincludeasetofworkcancompromisetheservertrusttoitsclients.AsthemodelwhichfocusingonusingCSPprocessalgebrainmodelingismodular,extendable,andscalable,morecomplexattackscenarios(combinationofsimpleones)canbedetectedusinga
5、ndverifyingsystemsaswellasonsystem-levelvulnera-themodel.bilityanalysis.CSPanditsmodelcheckerFDRbelongtoIndexterms—Securitymodelingandverification,Vulnera-classofformalismswhichcombineprogramminglanguagesbilityAnalysis,Attack,TCP.andfinitestatemachines.CSPiswidelyusedtomodelI.INTRODUCTIONandverifysyst
6、ems,e.g.verifyingend-to-endprotocols[3],specificationandverificationofintrusion-tolerantsystemsinAscomputernetworksgrowinsizeandcomplexity,theirMAFTIAproject[4],[5]andverificationofcryptographicsecuritybecomesmorecomplicated.Thegrowthofcomputerprotocols[6].In[7]Bellovindescribedsomeimplementationnetwor
7、ksandtheirdistributednature(lackofcentralcontrol)independentflawsinTransmissionControlProtocol(TCP).providesopportunitiesforinsidersandoutsiderstoviolateHealsopresentedavarietyofattacksbasedontheseflaws
此文档下载收益归作者所有