Using coloured petri nets to simulate DoS-resistant protocols
Contribuinte(s) |
Jensen, K |
---|---|
Data(s) |
2006
|
Resumo |
In this work, we examine unbalanced computation between an initiator and a responder that leads to resource exhaustion attacks in key exchange protocols. We construct models for two cryp-tographic protocols; one is the well-known Internet protocol named Secure Socket Layer (SSL) protocol, and the other one is the Host Identity Protocol (HIP) which has built-in DoS-resistant mechanisms. To examine such protocols, we develop a formal framework based on Timed Coloured Petri Nets (Timed CPNs) and use a simulation approach provided in CPN Tools to achieve a formal analysis. By adopting the key idea of Meadows' cost-based framework and re¯ning the de¯nition of operational costs during the protocol execution, our simulation provides an accurate cost estimate of protocol execution compar- ing among principals, as well as the percentage of successful connections from legitimate users, under four di®erent strategies of DoS attack. |
Formato |
application/pdf |
Identificador | |
Publicador |
University of Aarhus |
Relação |
http://eprints.qut.edu.au/23982/1/23982.pdf http://daimi.au.dk/CPnets/proxy.php?url=/CPnets/workshop06/index Tritilanunt, Suratose, Boyd, Colin, Foo, Ernest, & Gonzalez Nieto, Juan (2006) Using coloured petri nets to simulate DoS-resistant protocols. In Jensen, K (Ed.) CPN'06 7th Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools, 24 - 26 October 2006, Denmark, Aarhus. |
Direitos |
Copyright 2006 please consult authors |
Fonte |
Faculty of Science and Technology; Information Security Institute |
Palavras-Chave | #080110 Simulation and Modelling #080499 Data Format not elsewhere classified #DoS-resistant Protocol, SSL and HIP Model in CPN, CPN Simulation and Verification |
Tipo |
Conference Paper |