Detecting collusion attacks in security protocols

被引:0
|
作者
Chen, QF [1 ]
Chen, YPP
Zhang, SC
Zhang, CQ
机构
[1] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3128, Australia
[2] Univ Technol Sydney, Fac Informat Technol, Sydney, NSW 2007, Australia
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security protocols have been widely used to safeguard secure electronic transactions. We usually assume that principals are credible and shall not maliciously disclose their individual secrets to someone else. Nevertheless, it is impractical to completely ignore the possibility that some principals may collude in private to achieve a fraudulent or illegal purpose. Therefore, it is critical to address the possibility of collusion attacks in order to correctly analyse security protocols. This paper proposes a framework by which to detect collusion attacks in security protocols. The possibility of security threats from insiders is especially taken into account. The case study demonstrates that our methods are useful and promising in discovering and preventing collusion attacks.
引用
收藏
页码:297 / 306
页数:10
相关论文
共 50 条
  • [21] Tree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic Primitives
    Boichut, Yohan
    Heam, Pierre-Cyrille
    Kouchnarenko, Olga
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 239 : 57 - 72
  • [22] A deep learning approach for detecting security attacks on blockchain
    Scicchitano, Francesco
    Liguori, Angelica
    Guarascio, Massimo
    Ritacco, Ettore
    Manco, Giuseppe
    CEUR Workshop Proceedings, 2020, 2597 : 212 - 222
  • [23] Distributed Service Control Technique for Detecting Security Attacks
    Tupakula, Udaya
    Varadharajan, Vijay
    2012 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2012, : 574 - 577
  • [24] Security in Process: Detecting Attacks in Industrial Process Data
    Anton, Simon D. Duque
    Lohfink, Anna Pia
    Garth, Christoph
    Schotten, Hans Dieter
    THIRD CENTRAL EUROPEAN CYBERSECURITY CONFERENCE (CECC 2019), 2019,
  • [25] Security Protocols Against Cyber Attacks in the Distribution Automation System
    Lim, I. H.
    Hong, S.
    Choi, M. S.
    Lee, S. J.
    Kim, T. W.
    Lee, S. W.
    Ha, B. N.
    IEEE TRANSACTIONS ON POWER DELIVERY, 2010, 25 (01) : 448 - 455
  • [26] Timing attacks in security protocols: Symbolic framework and proof techniques
    Cheval, Vincent
    Cortier, Véronique
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 9036 : 280 - 299
  • [27] Design Requirements to Counter Parallel Session Attacks in Security Protocols
    Jurcut, Anca D.
    Coffey, Tom
    Dojen, Reiner
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 298 - 305
  • [28] Security and efficiency in authentication protocols resistant to password guessing attacks
    Kwon, T
    Song, JS
    LCN'97 - 22ND ANNUAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 1997, : 245 - 252
  • [29] On the security of Girault key agreement protocols against active attacks
    Oh, SH
    Mambo, M
    Shizuya, H
    Won, DH
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (05): : 1181 - 1189
  • [30] Planning attacks to security protocols: Case studies in logic programming
    Aiello, LC
    Massacci, F
    COMPUTATIONAL LOGIC: LOGIC PROGRAMMING AND BEYOND, PT I: ESSAYS IN HONOUR OF ROBERT A KOWALSKI, 2002, 2407 : 533 - 560