Mining inconsistent secure messages toward analyzing security protocols


Autoria(s): Zhang, Chengqi; Chen, Yi-Ping Phoebe; Zhang, Shichao; Chen, Qingfeng
Data(s)

01/01/2005

Resumo

Traditional approaches such as theorem proving and model checking have been successfully used to analyze security protocols. Ideally, they assume the data communication is reliable and require the user to predetermine authentication goals. However, missing and inconsistent data have been greatly ignored, and the increasingly complicated security protocol makes it difficult to predefine such goals. This paper presents a novel approach to analyze security protocols using association rule mining. It is able to not only validate the reliability of transactions but also discover potential correlations between secure messages. The algorithm and experiment demonstrate that our approaches are useful and promising.<br />

Identificador

http://hdl.handle.net/10536/DRO/DU:30008802

Idioma(s)

eng

Publicador

World Scientific Publishing Co. Pte. Ltd.

Relação

http://dro.deakin.edu.au/eserv/DU:30008802/n20050567.pdf

Direitos

2005, IJICS

Palavras-Chave #security protocol #association rule mining #secure message #inconsistency
Tipo

Journal Article