TITLE

Computer Assisted Proof of Resistance of Denial of Service Attacks in Security Protocols Based on Events with CryptoVerif in Computational Model

AUTHOR(S)
Bo Meng; Wei Chen
PUB. DATE
February 2012
SOURCE
International Journal of Digital Content Technology & its Applic;Feb2012, Vol. 6 Issue 3, p109
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Owning to the huge damage and difficulty of prevention of denial of service attacks in security protocols, people pay serious attentions on analysis, verification and prevention of denial of service attacks. Formal method in computational model is a powerful tool used to analyze and prove securities in security protocols, network and distributed system. But until now in computational model there does not exist an automatic method of proof of resistance of denial of service attacks. In this paper from the view of protocol state we initially present an automatic method of proof of resistance of denial of service attacks with CryptoVerif in computational model. Therefore Blanchet calculus is extended from adversary context, output process and the model of private channel, and then from the view of protocol state, the first automatic method of proof of resistance of denial of service attacks based on events in extended Blanchet calculus is proposed. Finally resistance of denial of service attacks in IEEE 802.11 i four-way handshake protocol is analyzed with CryptoVerif. The results we obtained are that it is not resistance of denial of service attacks. At the same time a new denial of service attack is found by us. Then the methods against denial of service attacks in IEEE 802.11 i four-way handshake protocol are proposed.
ACCESSION #
76388479

 

Related Articles

  • Take Charge of Your Network Against DDoS Attacks. Maurya, Rajesh // PC Quest;Jun2014, p20 

    The article discusses how organizations can protect themselves from Distributed Denial of Service (DDoS) attacks, which continue to be the top risk to computer networks around the world. It is said that one of the largest targets of cyber criminals for DDoS attacks is the financial services...

  • REVIEW OF SYN-FLOODING ATTACK DETECTION MECHANISM. Manna, Mehdi Ebady; Amphawan, Angela // International Journal of Distributed & Parallel Systems;Jan2012, Vol. 3 Issue 1, p99 

    Denial of Service (DoS) is a security threat which compromises the confidentiality of information stored in Local Area Networks (LANs) due to unauthorized access by spoofed IP addresses. SYN Flooding is a type of DoS which is harmful to network as the flooding of packets may delay other users...

  • Experimental Evaluation of Cisco ASA-5510 Intrusion Prevention System against Denial of Service Attacks. Gade, Raja Sekhar Reddy; Kumar, Sanjeev // Journal of Information Security;Apr2012, Vol. 3 Issue 2, p122 

    Cyber attacks are continuing to hamper working of Internet services despite increase in the use of network security systems such as, firewalls and Intrusion protection systems (IPS). Recent Denial of Service (DoS) attack on Independence Day weekend, on July 4th, 2009 launched to debilitate the...

  • Content Sniffing Attack Detection in Client and Server Side: A Survey. Thakur, Bhupendra Singh; Chaudhary, Sapna // International Journal of Advanced Computer Research;Jun2013, Vol. 3 Issue 10, p7 

    In today's environment we cannot think about internet. It has the interface of client and server. After analysing several research studies, we conclude that the communication between client and server may suffer from several security concerns like Denial of Service (DoS) attack, Content Sniffing...

  • A New Traffic Pattern Matching for DDoS Traceback Using Independent Component Analysis. Waizumi, Yuji; Sato, Tohru; Nemoto, Yoshiaki // World Academy of Science, Engineering & Technology;Dec2009, Issue 36, p760 

    Recently, Denial of Service(DoS) attacks and Distributed DoS(DDoS) attacks which are stronger form of DoS attacks from plural hosts have become security threats on the Internet. It is important to identify the attack source and to block attack traffic as one of the measures against these...

  • A Fast Proxy Binding Update Scheme Using Hierarchical Architecture. Hyun-Sun Kang // Journal of Security Engineering; 

    Without a proper protection mechanism for the signaling messages to be used for the mobility support in the PMIPv6, it is also vulnerable to several security attacks. So the PMIPv6 signaling messages have to be protected. In this paper, propose a fast and secure authentication scheme for the...

  • Protection Against Denial of Service Attacks: A Survey. LOUKAS, GEORGIOS; ÖKE, GÜLAY // Computer Journal;Sep2010, Vol. 53 Issue 7, p1020 

    Denial of service (DoS) is a prevalent threat in today's networks because DoS attacks are easy to launch, while defending a network resource against them is disproportionately difficult. Despite the extensive research in recent years, DoS attacks continue to harm, as the attackers adapt to the...

  • A COMPREHENSIVE STUDY OF DDOS ATTACKS AND DEFENSE MECHANISMS. JUYAL, SHUCHI; PRABHAKAR, RADHIKA // Journal of Information & Operations Management;2012, Vol. 3 Issue 1, p29 

    Distributed Denial of Service (DDoS) attacks on network systems in the Internet have become highly significant incidents and required to be solved immediately. These attacks are very complex and aim at crippling applications, servers, and whole networks, and disrupting legitimate user's...

  • DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS - CLASSIFICATION AND IMPLICATIONS. JAIN, ABHISHEK; SINGH, ASHWANI KUMAR // Journal of Information & Operations Management;2012, Vol. 3 Issue 1, p136 

    Denial of Service (DoS) attacks are in place since a long time and they pose a real threat to various Internet Services. They are characterized by the method used and damaged caused particularly in case of Distributed Denial of Service (DDoS) attack. This paper presents the problem of DDoS...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics