메뉴 건너뛰기




Volumn , Issue , 2008, Pages 12-19

A probabilistic attacker model for quantitative verification of DoS security threats

Author keywords

Denial of service; Model checking; Security

Indexed keywords

COMMERCE; COMMUNICATION; COMPUTER APPLICATIONS; COMPUTER SOFTWARE; COMPUTERS; ELECTRONIC COMMERCE; INTERNET PROTOCOLS; LAWS AND LEGISLATION; MARKOV PROCESSES; PATIENT MONITORING; PROBABILITY; SECURITY SYSTEMS; WORD PROCESSING;

EID: 51949118177     PISSN: 07303157     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/COMPSAC.2008.48     Document Type: Conference Paper
Times cited : (9)

References (15)
  • 2
    • 84949938425 scopus 로고    scopus 로고
    • DOS-resistant authentication with client puzzles
    • Proc. Security Protocols Worksh, Cambridge
    • Aura, T., Nikander, P., Leiwo, J., "DOS-resistant authentication with client puzzles", Proc. Security Protocols Worksh., Cambridge, Springer LNCS 2133, 170-181, 2001.
    • (2001) Springer LNCS , vol.2133 , pp. 170-181
    • Aura, T.1    Nikander, P.2    Leiwo, J.3
  • 3
    • 38349029320 scopus 로고    scopus 로고
    • Intrusion Attack Tactics for the model checking of e-commerce security guarantees
    • Proc. 26th Int. Conf. on Computer Safety, Reliability and Security SAFECOMP
    • Basagiannis, S., Katsaros, P. and Pombortsis, A. "Intrusion Attack Tactics for the model checking of e-commerce security guarantees", Proc. 26th Int. Conf. on Computer Safety, Reliability and Security (SAFECOMP), Springer LNCS 4680, 238-251, 2007.
    • (2007) Springer LNCS , vol.4680 , pp. 238-251
    • Basagiannis, S.1    Katsaros, P.2    Pombortsis, A.3
  • 4
    • 0020720357 scopus 로고
    • On the security of public-key protocols
    • Dolev, D. and Yao, A. "On the security of public-key protocols", IEEE Trans. on Information Theory, 2 (29), 198-208, 1983.
    • (1983) IEEE Trans. on Information Theory , vol.2 , Issue.29 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 5
    • 35248833782 scopus 로고    scopus 로고
    • Revisiting liveness properties in the context of secure systems
    • st Int. Conf. Formal Aspects on Security
    • st Int. Conf. Formal Aspects on Security, Springer LNCS 2629, 203-211, 2003.
    • (2003) Springer LNCS , vol.2629 , pp. 203-211
    • Gärtner, F.1
  • 6
    • 3142619105 scopus 로고    scopus 로고
    • IETF, Network Working Group, Internet Draft, Feb
    • IETF - Network Working Group. Host Identity Protocol. Internet Draft, Feb. 2007.
    • (2007) Host Identity Protocol
  • 7
    • 51949089353 scopus 로고    scopus 로고
    • Karn, P. and Simpson, A. Photuris: Session-key management protocol, RFC 2522, IETF Network Working Group, 1999.
    • Karn, P. and Simpson, A. Photuris: Session-key management protocol, RFC 2522, IETF Network Working Group, 1999.
  • 8
    • 34548060449 scopus 로고    scopus 로고
    • Kwiatkowska, M., Norman, G., Parker, D. Stochastic model checking, In: Formal Methods for the Design of Comp., Comm. & Software Systems: Performance Evaluation, Springer LNCS 4486, 220-270, 2007.
    • Kwiatkowska, M., Norman, G., Parker, D. "Stochastic model checking", In: Formal Methods for the Design of Comp., Comm. & Software Systems: Performance Evaluation, Springer LNCS 4486, 220-270, 2007.
  • 11
    • 51949114498 scopus 로고    scopus 로고
    • InfraMP Project Web Site, http://infrahip.hiit.fi/, (last access: 21st of December 2007).
    • InfraMP Project Web Site, http://infrahip.hiit.fi/, (last access: 21st of December 2007).
  • 12
    • 0035075103 scopus 로고    scopus 로고
    • A cost-based framework for analysis of DoS in networks
    • Meadows, C. "A cost-based framework for analysis of DoS in networks", J. Comp. Security, 9, 143-164, 2001
    • (2001) J. Comp. Security , vol.9 , pp. 143-164
    • Meadows, C.1
  • 14
    • 26444499465 scopus 로고    scopus 로고
    • On statistical model checking of stochastic systems
    • Pro. 17th Int. Conf. on Computer Aided Verification CAV'05
    • Sen, K., Viswanathan, M., Agha, G. "On statistical model checking of stochastic systems", Pro. 17th Int. Conf. on Computer Aided Verification (CAV'05), Springer LNCS 3576, 266-288, 2000.
    • (2000) Springer LNCS , vol.3576 , pp. 266-288
    • Sen, K.1    Viswanathan, M.2    Agha, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.