Identifying Dependency Between Secure Messages for Protocol Analysis

Publisher:
Springer
Publication Type:
Conference Proceeding
Citation:
Knowledge Science, Engineering and Management, 2007, pp. 30 - 38
Issue Date:
2007-01
Full metadata record
Files in This Item:
Filename Description Size
2007000694.pdf1.01 MB
Adobe PDF
Collusion attack has been recognized as a key issue in e-commerce systems and increasingly attracted peopleâs attention for quite some time in the literatures of information security. Regardless of the wide application of security protocol, this attack has been largely ignored in the protocol analysis. There is a lack of efficient and intuitive approaches to identify this attack since it is usually hidden and uneasy to find. Thus, this article addresses this critical issue using a compact and intuitive Bayesian network (BN)-based scheme. It assists in not only discovering the secure messages that may lead to the attack but also providing the degree of dependency to measure the occurrence of collusion attack. The experimental results demonstrate that our approaches are useful to detect the collusion attack in secure messages and enhance the protocol analysis.
Please use this identifier to cite or link to this item: