Modeling and Verification of Complex Network Attacks Using an Actor-Based Language

سال انتشار: 1384
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 1,697

فایل این مقاله در 7 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ACCSI11_198

تاریخ نمایه سازی: 5 آذر 1390

چکیده مقاله:

Increasing use of networks and their complexity have complicated the task of security analysis. Accordingly, automatic verification approaches have received more attention recently. In this paper, we showed how an attacker might combine simple attacks to construct a complex multiphase attack. We use Rebeca language to model the network of hosts and its model checker to find counter-examples as violation of security policies. Some simple attacks have been modeled in previous works in this area. First, we show these simple attacks in our model and then verify the model to find more complex attacks. These complex attacks may include some simpler attacks as their steps. We choose Rebeca because of its powerful yet simple actor-based paradigm in modeling concurrent and distributed systems.

نویسندگان

Hamid Reza Shahriari

Department of Computer Engineering Sharif University of Technology Tehran, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Computer Emergency Response Team [online], "CERT/CC from: ...
  • Computer Emergency Response Team, [online], "Computer oracle and password system ...
  • Internet Security Systems, [online], "System scanner infor mation", Available fro. ...
  • Network Associates, [online], "CyberCop Scanner Informa- http : //www .nai.com/ ...
  • D. Zerkle, and K. Levitt, "NetKuang - A Muti-Hot Con- ...
  • M. Dacier, Y. Deswarte, "Privilege Graph: An Extension to the ...
  • R. Ortalo, Y. Deswarte "Quantitative Evaluation of Informa- tion System ...
  • R.W. Ritchey and P. Ammann, "Using Model Checking to Analyze ...
  • SMV, :SMV: A Symbolic Model Checker", Available from: http://www.cs .cmu.edu/ ...
  • O. Sheyner, J. Haines, S. Jha, R. Lippmann, J.Wing, :Automated ...
  • S. Jha, O. Sheyner, J. Wing, :Two Formal Analyses of ...
  • O. Shyner, :Scenario Graphs and Attack Graphs", PhD. thesis, Carnegie ...
  • C. R. Ramakrishnan, and R. Sekar, "Model-Based Analysis of Configuration ...
  • H. R. Shahriari, and R. Jalili, "Using CSP to Model ...
  • Networking and Communication Conference (INCC'2004), [25] C. Hew it, "Description ...
  • Spin Model Checker [online], Available from: [26] P. Ryan, S. ...
  • from: [27] G. Rohrmair, G. Lowe, "Using CSP to detect ...
  • Report, Sharif University of Technology, Department of [28] G. Rohrmair ...
  • J. Undercoffer, and J. Pinkston, "Modeling Computer At- tacks: A ...
  • Proceedings of the Workshop on Automated Verification of [30] M. ...
  • M. Sirjani, and A. Movaghar, and H. Iravanchi, and M. ...
  • Distances, " _ of the _ _ _ rity Applications ...
  • C.A.R. Hoare, Communicating Sequential Processes, Pear- son Pub., 2004. ...
  • Computer Engineering, 2001. ...
  • M. Sirjani, and A. Movaghar, A. Shali, and F. de ...
  • M. Sirjani, and A. Movaghar, and M. R. Mousavi, "Compo- ...
  • Critical Systems (AVoCS01), pp.114-18, April 2001. ...
  • hoori, and A. Shali, "Model Checking in Rebeca", Proceed- ings ...
  • M. Sirjani, and A. Shali, M. Jaghoori, and H. Iravanchi, ...
  • and Modular Verification of Actor-Based Models", Pro- ceedings of Fourth ...
  • G. Agha, Actors: A Model of Concurret Computation in Distributed ...
  • نمایش کامل مراجع