Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in ...Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in the behaviors of the network and can not deal with the problem exactly. In this paper, we start from the security of the protocol, then we propose a novel theory for security protocol analysis of Denial of Service in order to deal with the DoS attack. We first introduce the conception of weighted graph to extend the strand space model, then we extend the penetrator model and define the goal of anti-DoS attack through the conception of the DoS-stop protocol, finally we propose two kinds of DoS test model and erect the novel formal theory for security protocol analysis of Denial of Service. Our new formal theory is applied in two example protocols. It is proved that the Internet key exchange (IKE) easily suffers from the DoS attacks, and the efficient DoS- resistant secure key exchange protocol (JFK) is resistant against DoS attack for the server, respectively.展开更多
针对安全协议中存在的拒绝服务(DoS)攻击,在串空间模型基础上,引入代价函数和节点相关度集合,使串空间模型能够全面、有效地分析安全协议是否存在拒绝服务攻击。利用该模型对IEEE802.11i握手协议以及JFK(just fast keying)协议进行建模...针对安全协议中存在的拒绝服务(DoS)攻击,在串空间模型基础上,引入代价函数和节点相关度集合,使串空间模型能够全面、有效地分析安全协议是否存在拒绝服务攻击。利用该模型对IEEE802.11i握手协议以及JFK(just fast keying)协议进行建模,从服务中止型和资源消耗型2个方面分析协议,发现了协议存在的DoS攻击漏洞,验证模型的可行性。展开更多
基金This work is supported by National Natural Science Foundation of China under contract 60902008.
文摘Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in the behaviors of the network and can not deal with the problem exactly. In this paper, we start from the security of the protocol, then we propose a novel theory for security protocol analysis of Denial of Service in order to deal with the DoS attack. We first introduce the conception of weighted graph to extend the strand space model, then we extend the penetrator model and define the goal of anti-DoS attack through the conception of the DoS-stop protocol, finally we propose two kinds of DoS test model and erect the novel formal theory for security protocol analysis of Denial of Service. Our new formal theory is applied in two example protocols. It is proved that the Internet key exchange (IKE) easily suffers from the DoS attacks, and the efficient DoS- resistant secure key exchange protocol (JFK) is resistant against DoS attack for the server, respectively.
文摘针对安全协议中存在的拒绝服务(DoS)攻击,在串空间模型基础上,引入代价函数和节点相关度集合,使串空间模型能够全面、有效地分析安全协议是否存在拒绝服务攻击。利用该模型对IEEE802.11i握手协议以及JFK(just fast keying)协议进行建模,从服务中止型和资源消耗型2个方面分析协议,发现了协议存在的DoS攻击漏洞,验证模型的可行性。