An environment for security protocol intrusion detection

作者: Alec Yasinsac

DOI: 10.3233/JCS-2002-101-208

关键词:

摘要: Secure electronic communication relies on cryptography. Even with perfect encryption, may be compromised without effective security protocols for key exchange, authentication, etc. We are now seeing proliferation of large secure environments characterized by high volume, encrypted traffic between principals, facilitated Public Key Infrastructures (PKI). PKIs dependent protocols. Unfortunately, susceptible to subtle errors. To date, we have relied formal methods tell us if effective. These do not provide complete or measurable protocol security. Security also subject the same implementation and administrative vulnerabilities as As a result, will continue operate that flaws. In this paper, describe method architecture detect intrusions in such Infrastructures. Our is based classic intrusion detection techniques knowledge-based behavior-based detection. 2 Section

参考文章(39)
Alec Yasinsac, William A. Wulf, Evaluating Cryptographic Protocols University of Virginia. ,(1993)
R Oppliger, Research note: Security issues related to mobile code and agent-based systems Computer Communications. ,vol. 22, pp. 1165- 1170 ,(1999) , 10.1016/S0140-3664(99)00083-3
Bruce Schneier, David Wagner, Analysis of the SSL 3.0 protocol WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2. pp. 4- 4 ,(1996)
Giovanni Vigna, Richard A. Kemmerer, NetSTAT: a network-based intrusion detection system Journal of Computer Security. ,vol. 7, pp. 37- 71 ,(1999) , 10.3233/JCS-1999-7103
Catherine A. Meadows, Catherine A. Meadows, Formal Verification of Cryptographic Protocols: A Survey international cryptology conference. pp. 135- 150 ,(1994) , 10.1007/BFB0000430
Brett C. Tjaden, A Method For Examining Cryptographic Protocols University of Virginia. ,(1997) , 10.18130/V3SZ84
S.H. Brackin, Automatically detecting most vulnerabilities in cryptographic protocols darpa information survivability conference and exposition. ,vol. 1, pp. 222- 236 ,(2000) , 10.1109/DISCEX.2000.824981
Tomas Sander, Christian F. Tschudin, Protecting Mobile Agents Against Malicious Hosts Mobile Agents and Security. pp. 44- 60 ,(1998) , 10.1007/3-540-68671-1_4
Eugene H. Spafford, Ivan Krsul, Todd Ellis, Mark Crosbie, Bryn Dole, IDIOT - Users Guide ,(1996)