Analyzing security protocols using association rule mining
journal contribution
posted on 2005-01-01, 00:00authored byQingfeng Chen, Yi-Ping Phoebe Chen
Current studies to analyzing security protocols using formal methods require users to predefine authentication goals. Besides, they are unable to discover potential correlations between secure messages. This research attempts to analyze security protocols using data mining. This is done by extending the idea of association rule mining and converting the verification of protocols into computing the frequency and confidence of inconsistent secure messages. It provides a novel and efficient way to analyze security protocols and find out potential correlations between secure messages. The conducted experiments demonstrate our approaches.
History
Journal
Lecture notes in computer science
Volume
LNAI 3809
Pagination
245 - 253
Location
Berlin, Germany
ISSN
0302-9743
eISSN
1611-3349
Language
eng
Notes
Book Title : AI 2005: Advances in Artificial Intelligence