Using CSP to model and analyze Transmission Control Protocol vulnerabilities within the broadcast network

The spread of networks and their increasing complexity have complicated the task of security analysis. Accordingly, automatic verification approaches have received more attention recently. We have modeled a network, including a set of hosts (clients and servers), using the process algebra CSP (commu...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Shahriari, H.R., Jalili, R.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The spread of networks and their increasing complexity have complicated the task of security analysis. Accordingly, automatic verification approaches have received more attention recently. We have modeled a network, including a set of hosts (clients and servers), using the process algebra CSP (communicating sequential processes) in order to verify the Transmission Control Protocol (TCP) behavior against an active intruder. The model is verified using the FDR tool and, as a result, some attack scenarios which violate security are found. The scenarios show how an intruder can compromise the server trust to its clients. As the model is modular, extendable, and scalable, more complex attack scenarios (combinations of simple ones) can be detected using it.
DOI:10.1109/INCC.2004.1366574