期刊文献+

非安全协议脆弱性的混合分析方法 被引量:1

Hybrid Analysis Method of Non-security Protocol Vulnerability
下载PDF
导出
摘要 针对手动方法对非安全协议分析过程中存在的不足,提出一种用于非安全协议的混合分析方法,并在手动分析的基础上,应用形式化自动工具分析协议的脆弱性。通过将该方法应用到移动IPv6协议,发现了新的脆弱性问题。仿真实验结果表明,该方法适合分析非安全协议,能够检查协议设计中的细微脆弱性问题,具有一定的系统性和较好的完备性。 Aiming at the weakness of manual analysis, this paper proposes a hybrid analysis method against protocol. An automatic analysis tool is applied based on the manual analysis in order to reach completeness. Some vulnerability is found when applying the hybrid method to check mobile IPv6 protocol. Simulational experiment results show that the hybrid method can analyze non-security protocols and find the subtle vulnerability, and it is a systematic method with completeness guarantee.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第6期133-136,共4页 Computer Engineering
基金 中央财经大学"211工程"三期基金资助项目 中央财经大学校级重点学科建设基金资助项目
关键词 协议分析 非安全协议 脆弱性 移动IPV6 欺骗攻击 protocol analysis non-security protocol vulnerability mobile IPv6 spoofing attack
  • 相关文献

参考文献5

  • 1Ning Peng, Sun Kun. How to Misuse AODV: A Case Study of Insider Attacks Against Mobile Ad Hoc Routing Protocols[C]// Proceedings of the 4th Annual IEEE Information Assurance Workshop. [S. l.]: IEEE Press, 2003: 60-67. 被引量:1
  • 2Lowe G. Brea ng and Fixing the Needham-schroeder Public-key Protocol Using FDR[C]//Proc. of TACAS'96. [S. l.]: Springer- Verlag, 1996: 147-166. 被引量:1
  • 3Shmatikov V, Stem U. Efficient Finite-state Analysis for Large Security Protocols[C]//Proc. of the 11th IEEE Computer Security Foundations Workshop. [S. l,]: IEEE Press, 1998: 106-115. 被引量:1
  • 4Meadows C. A Formal Framework and Evaluation Method for Network Denial of Service[C]//Proc. of the 12th IEEE Computer Security Foundations Workshop. [S. l.]: IEEE Press, 1999. 被引量:1
  • 5Narayana P, Chela Ruiming, Zhao Yao, et al. Automatic Vulnerability Checking of IEEE 802.16 WiMAX Protocols Through TLA+[C]//Proc. of the 2nd IEEE Workshop on Secure Network Protocols. [S. l.]: IEEE Press, 2006: 44-49. 被引量:1

同被引文献6

  • 1唐洪,罗宇,陈华.网络系统脆弱性动态触发技术研究[J].计算机工程,2004,30(19):106-107. 被引量:2
  • 2Liers F,,Mitschele-Thiel A.UMTS Data Capacity ImprovementsEmploying Dynamic RRC Timeouts. Proc.of PIMRC’’05 . 2005 被引量:1
  • 3Radio Resource Management Strategies. 3GPP TS 25.992-2007 . 2007 被引量:1
  • 4Lee P P C,Bu Tian,Woo T.On the Detection of Signaling DoSAttacks on 3G Wireless Networks. Proc.of INFOCOM’’07 . 2007 被引量:1
  • 5Radio Resource Control (RRC) Protocol Specification. 3GPP TS 25.331 V4.20.0 . 2008 被引量:1
  • 6Pekka H.J.Perala,Antonio Barbuzzi,Gennaro Boggia,Kostas Pentikousis.Theory and Practice of RRC State Transitions in UMTS Networks. IEEE Broadband Wireless Access Workshop . 2009 被引量:1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部