首页 | 本学科首页   官方微博 | 高级检索  
     

安全协议的攻击分类及其安全性评估
引用本文:卓继亮,李先贤,李建欣,怀进鹏.安全协议的攻击分类及其安全性评估[J].计算机研究与发展,2005,42(7):1100-1107.
作者姓名:卓继亮  李先贤  李建欣  怀进鹏
作者单位:北京航空航天大学计算机学院,北京,100083
基金项目:国家自然科学基金项目(90412011),国家“八六三”高技术研究发展计划基金项目(2003AA144150)
摘    要:对安全协议的安全性进行全面评估是十分重要的,但难度非常大.目前大量的研究工作主要集中于分析开放网络环境下安全协议的一些特定安全属性,例如,秘密性和认证性等.为了更全面地评估安全协议的安全防护能力,从攻击者的能力和攻击后果两个角度,提出一种新的安全协议攻击分类,并分析了不同攻击类型的特点与机理.在此基础上,探讨了安全协议的一种安全性评估框架,有助于更客观地评价安全协议的实际安全防护能力和设计新的协议.

关 键 词:安全协议  攻击分类  安全性评估  形式化方法

A New Taxonomy of Attacks on Security Protocols and Their Security Evaluation
Zhuo Jiliang,LI Xianxian,Li Jianxin,Huai Jinpeng.A New Taxonomy of Attacks on Security Protocols and Their Security Evaluation[J].Journal of Computer Research and Development,2005,42(7):1100-1107.
Authors:Zhuo Jiliang  LI Xianxian  Li Jianxin  Huai Jinpeng
Abstract:Security analysis and evaluation for security protocols are very important, yet it is usually hard to carry out. Almost all the existing research work concentrates on analyzing certain security properties of protocols on the open network environment, such as secrecy and authentication. To evaluate security protocols on capabilities of defending attacks more comprehensively, the classification of intruders' abilities is studied, and a new taxonomy of attacks on security protocols based on both intruders' capabilities and attack consequences is also presented. With the classification, the corresponding characteristics and mechanisms of every attack type are analyzed. Finally, a security evaluation framework for security protocols based on the 2-dimensions taxonomy is discussed, which helps to objectively evaluate capabilities of preventing attacks on security protocols and also helps to design new security protocols.
Keywords:security protocol  taxonomy of attacks  security evaluation  formal method
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号