Analyzing security protocols using association rule mining

Chen, Qingfeng and Chen, Yi-Ping Phoebe 2005, Analyzing security protocols using association rule mining, Lecture notes in computer science, vol. LNAI 3809, pp. 245-253.

Attached Files
Name Description MIMEType Size Downloads

Title Analyzing security protocols using association rule mining
Author(s) Chen, Qingfeng
Chen, Yi-Ping Phoebe
Journal name Lecture notes in computer science
Volume number LNAI 3809
Start page 245
End page 253
Publisher Springer-Verlag
Place of publication Berlin, Germany
Publication date 2005
ISSN 0302-9743
1611-3349
Keyword(s) Artificial intelligence
security
Summary Current studies to analyzing security protocols using formal methods require users to predefine authentication goals. Besides, they are unable to discover potential correlations between secure messages. This research attempts to analyze security protocols using data mining. This is done by extending the idea of association rule mining and converting the verification of protocols into computing the frequency and confidence of inconsistent secure messages. It provides a novel and efficient way to analyze security protocols and find out potential correlations between secure messages. The conducted experiments demonstrate our approaches.
Notes Book Title : AI 2005: Advances in Artificial Intelligence
Language eng
Field of Research 080199 Artificial Intelligence and Image Processing not elsewhere classified
HERDC Research category C1 Refereed article in a scholarly journal
Copyright notice ©2005, Springer-Verlag Berlin Heidelberg
Persistent URL http://hdl.handle.net/10536/DRO/DU:30003063

Document type: Journal Article
Collection: School of Engineering and Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 378 Abstract Views, 0 File Downloads  -  Detailed Statistics
Created: Mon, 07 Jul 2008, 08:42:17 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.