会议专题

Adaptive Intrusion-Tolerant Approach to Defeat Attacks of Cryptographic Protocol

An adaptive intrusion-tolerant approach to protect the operation security of cryptographic protocol is proposed, and the main building block of this approach is studied, which is composed of intrusion detection and intrusion tolerance module. By adopting mixed intrusion detection mode, the intrusion detection module uses the finite state machine to match parameters in the running of cryptographic protocol, and conducts real-time detection characteristics of cryptographic protocol operation, then sends detection results to intrusion tolerance module. Intrusion tolerance module can trigger pre-designed self-adaptive polices, which could adjust algorithmic and parametric of the cryptographic protocol, to tolerate or prevent some specific type of attacks. Analysis shows our approach can defeat attacks of cryptographic protocol, protect the safety of cryptographic protocol and have a low cost.

Cryptographic Protocol Adaptive Intrusion Tolerant Intrusion Detecting Finite State Machine

HAO Yaohui GUO Yuanbo Ge Changtao Wu Guo

Institute of Electronic Technology, the PLA Information Engineering University, Zhengzhou, China, 450004

国际会议

第八届国际测试技术研讨会(8th International Symposium on Test and Measurement)

重庆

英文

3444-3447

2009-08-01(万方平台首次上网日期,不代表论文的发表时间)