메뉴 건너뛰기




Volumn 28, Issue 6, 2009, Pages 450-465

Probabilistic model checking for the quantification of DoS security threats

Author keywords

Attacker model; Denial of service; Probabilistic model checking; Resource exhaustion; Secure authentication

Indexed keywords

ATTACKER MODEL; DENIAL OF SERVICE; PROBABILISTIC MODEL CHECKING; RESOURCE EXHAUSTION; SECURE AUTHENTICATION;

EID: 67649723048     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2009.01.002     Document Type: Article
Times cited : (25)

References (27)
  • 6
    • 67649825382 scopus 로고    scopus 로고
    • Castelliccia C, Mykletun E, Tsudik G. Improving secure server performance by rebalancing SSL/TLS handshakes. Cryptology ePrint Archive 2005/037. IACR. http://eprint.iacr.org/2005/037 (accessed 18.08.08).
    • Castelliccia C, Mykletun E, Tsudik G. Improving secure server performance by rebalancing SSL/TLS handshakes. Cryptology ePrint Archive 2005/037. IACR. http://eprint.iacr.org/2005/037 (accessed 18.08.08).
  • 8
    • 4143130116 scopus 로고    scopus 로고
    • accessed 28.12.07
    • CERT coordination center. Denial of service attacks. http://www.cert.org/tech_tips/ denial_of_service.html (accessed 28.12.07).
    • Denial of service attacks
  • 12
    • 0003096318 scopus 로고
    • A logic for reasoning about time and reliability
    • Hansson H., and Jonsson B. A logic for reasoning about time and reliability. Formal Aspects of Computing 6 5 (1994) 512-535
    • (1994) Formal Aspects of Computing , vol.6 , Issue.5 , pp. 512-535
    • Hansson, H.1    Jonsson, B.2
  • 13
    • 67649829390 scopus 로고    scopus 로고
    • InfraHIP project web site, accessed 21.12.07
    • InfraHIP project web site. http://infrahip.hiit.fi/ (accessed 21.12.07).
  • 20
    • 0035075103 scopus 로고    scopus 로고
    • A cost-based framework for analysis of DoS in networks
    • Meadows C. A cost-based framework for analysis of DoS in networks. Journal of Computer Security 9 1/2 (2001) 143-164
    • (2001) Journal of Computer Security , vol.9 , Issue.1-2 , pp. 143-164
    • Meadows, C.1
  • 21
    • 0037250964 scopus 로고    scopus 로고
    • Formal methods for cryptographic protocol analysis: emerging issues and trends
    • Meadows C. Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE Journal on Selected Areas in Communications 21 1 (2003) 44-54
    • (2003) IEEE Journal on Selected Areas in Communications , vol.21 , Issue.1 , pp. 44-54
    • Meadows, C.1
  • 22
    • 67649759831 scopus 로고    scopus 로고
    • PRISM model checker web site, accessed 3.01.08
    • PRISM model checker web site. http://www.prismmodelchecker.org/ (accessed 3.01.08).
  • 26
    • 84872811083 scopus 로고    scopus 로고
    • Smith J, Gonzalez-Nieto JM, Boyd C. Modelling denial of service attacks on JFK with Meadows's cost-based framework. Proceedings of the fourth Australasian information security workshop (AISW-NetSec). CRPIT Series; 2006. p. 125-34.
    • Smith J, Gonzalez-Nieto JM, Boyd C. Modelling denial of service attacks on JFK with Meadows's cost-based framework. Proceedings of the fourth Australasian information security workshop (AISW-NetSec). CRPIT Series; 2006. p. 125-34.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.