期刊文献+

基于抽象原则和模型检测的网络协议安全分析 被引量:5

Network Protocol Security Analysis Based on Abstract Principle and Model Detection
原文传递
导出
摘要 提出了一种可以缓解状态空间爆炸的抽象原则,对模型设计过程中的辅助变量、报文字段、自动状态机数量进行科学约简,在尽量不影响验证结果准确度的前提下,降低了模型的复杂度.在此基础上,提出了一种半自动化建模框架,只需用户提供少量必须的输入,不需要学习语法,就可以自动生成具有统一规范的模型,方便研究人员查阅和使用.实验结果表明,采用所提的抽象原则和半自动化建模框架创建的模型,可以验证网络协议的相关属性. An abstract principle is proposed to mitigate the explosion of state space. The proposed scheme scientifically reduces the auxiliary variables,message fields and numbers of automatic state machines in the process of model design,and reduces the complexity and size of the model on the premise of minimizing the accuracy of verification results. A semi-automatic modeling framework is proposed thereafter,which can automatically generate models with uniform specifications with only a small amount of input provided by users and no need to learn grammar,which is convenient for researchers to consult and use.Experiments show that the model based on the proposed abstract principle and the semi-automatic modeling framework can verify the properties of the network protocol.
作者 王晓楠 符劲轩 虞红芳 孙罡 陈海兵 WANG Xiao-nan;FU Jin-xuan;YU Hong-fang;SUN Gang;CHEN Hai-bing(School of Information and Communication Engineering,University of Klectronic Science and Technology of China,Chengdu 611731,China;CLP Network Space Security Research Institute Company with Limited Liability,Beijing 610041,China)
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2021年第2期40-46,共7页 Journal of Beijing University of Posts and Telecommunications
基金 国家重点研发计划项目(2019YFB1802800)。
关键词 模型检测 网络协议 抽象原则 model detection network protocol abstract principle
  • 相关文献

参考文献4

二级参考文献17

  • 1肖美华,薛锦云.时态逻辑形式化描述并发系统性质[J].海军工程大学学报,2004,16(5):10-13. 被引量:12
  • 2肖美华,薛锦云.基于SPIN/Promela的并发系统验证[J].计算机科学,2004,31(8):201-203. 被引量:20
  • 3薛锐,冯登国.安全协议的形式化分析技术与方法[J].计算机学报,2006,29(1):1-20. 被引量:61
  • 4Maggi P,Sisto R.Using SPIN to verify security properties of cryptographic protocols[C]//SPIN' 2002 Workshop,2002.
  • 5Xiao Mei-hua,Xue Jin-yun.Modeling and verifying cryptographic protocols using SPIN/Promela[J].International Journal of Computer and Information Science,2005,6( 1 ) : 1-12.
  • 6李静.网络安全认证协议自动分析系统[D].南昌:南昌大学,2006.
  • 7Josang A.Security Protocol Verification Using SPIN[C].SPIN'95 Workshop,1995.
  • 8Maggi P,Sisto R.Using SPIN to Verify Security Properties of Cryptographic Protocols[C].SPIN'2002 Workshop,2002.
  • 9Kaufman C.Internet Key Exchange (IKEv2) Protocol[EB/OL].Internet Draft.http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ikev2-11.txt.Oct.9,2003
  • 10Perlman R.Understanding IKEv2:Tutorial,and Rationale for Decisions[EB/OL].http://www.tatsuyababa.com/internet-drafts/draft-ietf-ipsec-ikev2-tutorial-01.txt.2003-01.

共引文献17

同被引文献61

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部