首页 | 本学科首页   官方微博 | 高级检索  
     

基于着色Petri网仿真模型的安全协议分析
引用本文:龙士工,李祥.基于着色Petri网仿真模型的安全协议分析[J].计算机仿真,2005,22(6):95-97.
作者姓名:龙士工  李祥
作者单位:贵州大学计算机软件与理论研究所,贵州,贵阳550025;贵州大学计算机软件与理论研究所,贵州,贵阳550025
摘    要:采取形式化方法验证协议的安全性,Petri网是有效的方法之一,但传统Petri网分析过程中经常会出现状态空间爆炸问题。该文采用了基于着色Petri网建立安全协议及入侵者攻击的仿真模型方法,从而获得仿真数据。该方法利用逆向状态分析和Petri网可达性分析,能有效地发现协议中的安全漏洞。并且,如果能恰当地控制好状态空间,则能有效地克服Petri网分析过程中的状态空间爆炸问题。该文给出的利用着色Petri网建立安全协议仿真模型分析的一般方法,实例说明该方法具有普适性,并且方便利用Petri网自动化分析工具实现自动化分析。

关 键 词:协议分析  可达性分析  仿真
文章编号:1006-9348(2005)06-0095-03
修稿时间:2003年2月17日

The Analysis of Secure Protocols Based on Coloured Petri Nets Simulation Model
LONG Shi-Gong,LI Xiang.The Analysis of Secure Protocols Based on Coloured Petri Nets Simulation Model[J].Computer Simulation,2005,22(6):95-97.
Authors:LONG Shi-Gong  LI Xiang
Abstract:Using the formalized method to validate the safety of the protocol, Petri nets is one of these valid methods. But in the process of conventional petri nets analysis, the problem of state space explosion of ten occurs. This paper proposed a modeling and simulation approach for secure protocol and attacked protocol by intruders based on colored petri nets to get simulation data. The methodology is based on the idea of backward state analysis and the reachability analysis for Petri nets. By using this method, the insecure problems can be found effectively. And if state space is rightly controlled , the problem of state space explosion in the process of Petri nets analysis can be a-voided. This paper gives a normal method to validate secure protocol using colored Petri nets simulation model. The example in the paper shows that the method is applicable universally. And the method will easily realize automatic a-nalysis by using Petri nets tools for analysis.
Keywords:Protocols analysis  Reachability analysis  Simulation
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号