科研成果详情

发表状态已发表Published
题名Towards risk evaluation of denial-of-service vulnerabilities in security protocols
作者
发表日期2010
发表期刊Journal of Computer Science and Technology
ISSN/eISSN1000-9000
卷号25期号:2页码:375-387
摘要

Denial-of-Service (DoS) attacks are virulent to both computer and networked systems. Modeling and evaluating DoS attacks are very important issues to networked systems; they provide both mathematical foundations and theoretic guidelines to security system design. As defense against DoS has been built more and more into security protocols, this paper studies how to evaluate the risk of DoS in security protocols. First, we build a formal framework to model protocol operations and attacker capabilities. Then we propose an economic model for the risk evaluation. By characterizing the intruder capability with a probability model, our risk evaluation model specifies the "Value-at- Risk" (VaR) for the security protocols. The "Value-at-Risk" represents how much computing resources are expected to lose with a given level of confidence. The proposed model can help users to have a better understanding of the protocols they are using, and in the meantime help designers to examine their designs and get clues of improvement. Finally we apply the proposed model to analyze a key agreement protocol used in sensor networks and identify a DoS flaw there, and we also validate the applicability and effectiveness of our risk evaluation model by applying it to analyze and compare two public key authentication protocols. © 2010 Springer.

关键词Denial-of-Service (DoS) Risk evaluation Value-at-Risk (VaR)
DOI10.1007/s11390-010-9330-4
URL查看来源
收录类别SCIE
语种英语English
WOS研究方向Computer Science
WOS类目Computer Science, Hardware & Architecture ; Computer Science, Software Engineering
WOS记录号WOS:000275623200016
Scopus入藏号2-s2.0-77952191032
引用统计
文献类型期刊论文
条目标识符https://repository.uic.edu.cn/handle/39GCC9TT/13562
专题个人在本单位外知识产出
通讯作者Chen, Zhong
作者单位
1.China Mobile Research Institute,Beijing 100053,China
2.School of Electronics Engineering and Computer Science,Peking University,Beijing 100871,China
3.Key Laboratory of High Confidence Software Technologies,Ministry of Education,Beijing 100871,China
推荐引用方式
GB/T 7714
Cao, Zhen,Guan, Zhi,Chen, Zhonget al. Towards risk evaluation of denial-of-service vulnerabilities in security protocols[J]. Journal of Computer Science and Technology, 2010, 25(2): 375-387.
APA Cao, Zhen, Guan, Zhi, Chen, Zhong, Hu, Jianbin, & Tang, Liyong. (2010). Towards risk evaluation of denial-of-service vulnerabilities in security protocols. Journal of Computer Science and Technology, 25(2), 375-387.
MLA Cao, Zhen,et al."Towards risk evaluation of denial-of-service vulnerabilities in security protocols". Journal of Computer Science and Technology 25.2(2010): 375-387.
条目包含的文件
条目无相关文件。
个性服务
查看访问统计
谷歌学术
谷歌学术中相似的文章
[Cao, Zhen]的文章
[Guan, Zhi]的文章
[Chen, Zhong]的文章
百度学术
百度学术中相似的文章
[Cao, Zhen]的文章
[Guan, Zhi]的文章
[Chen, Zhong]的文章
必应学术
必应学术中相似的文章
[Cao, Zhen]的文章
[Guan, Zhi]的文章
[Chen, Zhong]的文章
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。