Deakin University
Browse

Analyzing security protocols using association rule mining

journal contribution
posted on 2005-01-01, 00:00 authored by Qingfeng Chen, Yi-Ping Phoebe Chen
Current studies to analyzing security protocols using formal methods require users to predefine authentication goals. Besides, they are unable to discover potential correlations between secure messages. This research attempts to analyze security protocols using data mining. This is done by extending the idea of association rule mining and converting the verification of protocols into computing the frequency and confidence of inconsistent secure messages. It provides a novel and efficient way to analyze security protocols and find out potential correlations between secure messages. The conducted experiments demonstrate our approaches.

History

Journal

Lecture notes in computer science

Volume

LNAI 3809

Pagination

245 - 253

Publisher

Springer-Verlag

Location

Berlin, Germany

ISSN

0302-9743

eISSN

1611-3349

Language

eng

Notes

Book Title : AI 2005: Advances in Artificial Intelligence

Publication classification

C1 Refereed article in a scholarly journal

Copyright notice

2005, Springer-Verlag Berlin Heidelberg

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC