2008 32nd Annual IEEE International Computer Software and Applications Conference 2008
DOI: 10.1109/compsac.2008.48
|View full text |Cite
|
Sign up to set email alerts
|

A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…We have composed a successful target‐oriented intruder model, as a formal guidance manuscript giving the opportunity to correct model a protocol system while enforcing an intruder with specific attack tactics, aiming in this way, the model checker to validate the protocol against known attack actions. Although the difference of the used formal analysis in 2 and 13, we denote in this paper the scalability and the effectiveness of adopting such an intruder development approach for the verification of security protocols.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…We have composed a successful target‐oriented intruder model, as a formal guidance manuscript giving the opportunity to correct model a protocol system while enforcing an intruder with specific attack tactics, aiming in this way, the model checker to validate the protocol against known attack actions. Although the difference of the used formal analysis in 2 and 13, we denote in this paper the scalability and the effectiveness of adopting such an intruder development approach for the verification of security protocols.…”
Section: Discussionmentioning
confidence: 99%
“…This allows the application of the proposed intruder model to larger and more complex systems and, thus, opening new potentialities in revealing for example multi‐protocol attacks 12 on cryptographic protocols that are executed in the same environment. Using the same intruder's formal description we have successfully described and implemented in 13 an intruder model for performing a Denial of Service attack to the Host Identity Protocol (HIP) 14. While in 2 we have also used the SPIN model checker, in 13 we modeled the specified intruder (and its actions) with PRISM, using probabilistic model checking primitives.…”
Section: Introductionmentioning
confidence: 99%
“…We use PRISM [21] which is a probabilistic model checking tool to evaluate the performance of the priority message example because that tool has already been apply in randomized distributed algorithms [22], communication protocols [23] and security [24]. The tool of PRISM is a probabilistic model checker using an automatic formal verification technique for the analysis of systems which exhibit stochastic behavior.…”
Section: Numerical Resultsmentioning
confidence: 99%
“…In Listing 2, it is assumed that the verification rate remains the same for verifications performed by the same entity. Thus, ver E 1 = ver E 3 …”
Section: Develop the Cemd-ctmc Modelmentioning
confidence: 99%
“…During the last decades, the fact that a number of communication protocols have been published with security flaws [1,2,3] urges the protocol designers the CEMD protocol can assure security guaranties for low-cost participants involved in multiple protocol sessions and operating in error-prone environments, and if so, at what cost. Thus, the next two circles of Fig.…”
Section: Introductionmentioning
confidence: 99%