A New Dynamic Protocol Analysis Model

Article Preview

Abstract:

Traditional static analysis methods such as formal validation and theorem proving were used to analyze protocols security previously. These methods can not measure and evaluate actual security of protocols accurately for the setting and suppose are far from the actual conditions. This paper proposes a new dynamic protocol analysis model. The system based on the model can be used to active test in actual running conditions, analyze known protocols security, integrity, robustness, and analyze unknown protocols online, provide support for protocol designer. The systems structure, working flow and implementation of key modules are described. The experimental results validate the validity of the models design.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 765-767)

Pages:

1761-1765

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Wei Zhang. Research on Passive Testing of Communication Protocols based on Finite State Machine[D]. A Dissertation Submitted to University of Science and Technology of China for the Academic Degree of Doctor, 2007(In Chinese).

Google Scholar

[2] Chang Zhang. Research on the Techniques based on Multi-set Rewriting for Analyzing the Secure Properties of Cryptographic Protocols [D]. A Dissertation Submitted to Information Engineering University for the Academic Degree of Master, 2006(In Chinese).

Google Scholar

[3] F.J. Thayer, J.C. Herzog, and J.D. Guttman. Strand Spaces: Proving Security Protocols Correct[J]. Journal of Computer Security, pp.191-230, (1999).

DOI: 10.3233/jcs-1999-72-304

Google Scholar

[4] Rui Xue, Dengguo Feng, The Approaches and Technologies for Formal Verification of Security Protocols [J]. Chinese Journal of Computers, vol. 29, No. 1, pp.1-20, 2006 (In Chinese).

Google Scholar

[5] D. Basin,S. Modersheim,L. Vigano, OFMC: A Symbolic Model-Checker for Security Protocols[J]. International Journal of Information Security, pp.181-208, (2005).

DOI: 10.1007/s10207-004-0055-7

Google Scholar

[6] Lijuan Jiang, Buren Qian, Study and Design of Protocol Robustness Test Tool Based on XML [J]. Journal of Science Technology and Engineering. vol. 10, No. 14, pp.3527-3530, 2010(In Chinese).

Google Scholar

[7] Liu D X, Chi C H, Li M. Normalizing Traffic Pattern Anonymity for Mission Critical Applications[C]/Proc. of the 37th Annual Simulation Symposium, Arlington, VA, USA. (2004).

DOI: 10.1109/simsym.2004.1299494

Google Scholar

[8] Xinyan Lv, Baohua Zhao, Ying Zhou, Dynamic Protocol Conformance Testing Method[J]. Journal of University of Science and Technology of China, vol. 25, No. 3, pp.398-404, 2005 (In Chinese).

Google Scholar

[9] Yongjun He, Hui Shu, Xiaobing Xiong, Network Protocol Reverse Parsing Based on Dynamic Binary Analysis [J]. Journal of Computer Engineering, vol. 36, No. 9, pp.268-270, 2010(In Chinese).

Google Scholar