Deakin University
Browse

File(s) under permanent embargo

Mining inconsistent secure messages toward analyzing security protocols

journal contribution
posted on 2005-01-01, 00:00 authored by C Zhang, Yi-Ping Phoebe Chen, Shichao Zhang, Qingfeng Chen
Traditional approaches such as theorem proving and model checking have been successfully used to analyze security protocols. Ideally, they assume the data communication is reliable and require the user to predetermine authentication goals. However, missing and inconsistent data have been greatly ignored, and the increasingly complicated security protocol makes it difficult to predefine such goals. This paper presents a novel approach to analyze security protocols using association rule mining. It is able to not only validate the reliability of transactions but also discover potential correlations between secure messages. The algorithm and experiment demonstrate that our approaches are useful and promising.

History

Journal

International journal of intelligent control and systems

Volume

10

Issue

1

Pagination

77 - 85

Publisher

World Scientific Publishing Co. Pte. Ltd.

Location

Singapore

ISSN

0218-7965

Language

eng

Publication classification

C1 Refereed article in a scholarly journal

Copyright notice

2005, IJICS

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC