发表状态 | 已发表Published |
题名 | Towards risk evaluation of denial-of-service vulnerabilities in security protocols |
作者 | |
发表日期 | 2010 |
发表期刊 | Journal of Computer Science and Technology
![]() |
ISSN/eISSN | 1000-9000 |
卷号 | 25期号:2页码:375-387 |
摘要 | Denial-of-Service (DoS) attacks are virulent to both computer and networked systems. Modeling and evaluating DoS attacks are very important issues to networked systems; they provide both mathematical foundations and theoretic guidelines to security system design. As defense against DoS has been built more and more into security protocols, this paper studies how to evaluate the risk of DoS in security protocols. First, we build a formal framework to model protocol operations and attacker capabilities. Then we propose an economic model for the risk evaluation. By characterizing the intruder capability with a probability model, our risk evaluation model specifies the "Value-at- Risk" (VaR) for the security protocols. The "Value-at-Risk" represents how much computing resources are expected to lose with a given level of confidence. The proposed model can help users to have a better understanding of the protocols they are using, and in the meantime help designers to examine their designs and get clues of improvement. Finally we apply the proposed model to analyze a key agreement protocol used in sensor networks and identify a DoS flaw there, and we also validate the applicability and effectiveness of our risk evaluation model by applying it to analyze and compare two public key authentication protocols. © 2010 Springer. |
关键词 | Denial-of-Service (DoS) Risk evaluation Value-at-Risk (VaR) |
DOI | 10.1007/s11390-010-9330-4 |
URL | 查看来源 |
收录类别 | SCIE |
语种 | 英语English |
WOS研究方向 | Computer Science |
WOS类目 | Computer Science, Hardware & Architecture ; Computer Science, Software Engineering |
WOS记录号 | WOS:000275623200016 |
Scopus入藏号 | 2-s2.0-77952191032 |
引用统计 | |
文献类型 | 期刊论文 |
条目标识符 | https://repository.uic.edu.cn/handle/39GCC9TT/13562 |
专题 | 个人在本单位外知识产出 |
通讯作者 | Chen, Zhong |
作者单位 | 1.China Mobile Research Institute,Beijing 100053,China 2.School of Electronics Engineering and Computer Science,Peking University,Beijing 100871,China 3.Key Laboratory of High Confidence Software Technologies,Ministry of Education,Beijing 100871,China |
推荐引用方式 GB/T 7714 | Cao, Zhen,Guan, Zhi,Chen, Zhonget al. Towards risk evaluation of denial-of-service vulnerabilities in security protocols[J]. Journal of Computer Science and Technology, 2010, 25(2): 375-387. |
APA | Cao, Zhen, Guan, Zhi, Chen, Zhong, Hu, Jianbin, & Tang, Liyong. (2010). Towards risk evaluation of denial-of-service vulnerabilities in security protocols. Journal of Computer Science and Technology, 25(2), 375-387. |
MLA | Cao, Zhen,et al."Towards risk evaluation of denial-of-service vulnerabilities in security protocols". Journal of Computer Science and Technology 25.2(2010): 375-387. |
条目包含的文件 | 条目无相关文件。 |
个性服务 |
查看访问统计 |
谷歌学术 |
谷歌学术中相似的文章 |
[Cao, Zhen]的文章 |
[Guan, Zhi]的文章 |
[Chen, Zhong]的文章 |
百度学术 |
百度学术中相似的文章 |
[Cao, Zhen]的文章 |
[Guan, Zhi]的文章 |
[Chen, Zhong]的文章 |
必应学术 |
必应学术中相似的文章 |
[Cao, Zhen]的文章 |
[Guan, Zhi]的文章 |
[Chen, Zhong]的文章 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论