Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in ...Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in the behaviors of the network and can not deal with the problem exactly. In this paper, we start from the security of the protocol, then we propose a novel theory for security protocol analysis of Denial of Service in order to deal with the DoS attack. We first introduce the conception of weighted graph to extend the strand space model, then we extend the penetrator model and define the goal of anti-DoS attack through the conception of the DoS-stop protocol, finally we propose two kinds of DoS test model and erect the novel formal theory for security protocol analysis of Denial of Service. Our new formal theory is applied in two example protocols. It is proved that the Internet key exchange (IKE) easily suffers from the DoS attacks, and the efficient DoS- resistant secure key exchange protocol (JFK) is resistant against DoS attack for the server, respectively.展开更多
PKI and IPSec are the widely used technologies in today's information security area. In this paper ,PKI andIPSec are discussed briefly at first. Then two methods of combining PKI with IPSec are proposed with detai...PKI and IPSec are the widely used technologies in today's information security area. In this paper ,PKI andIPSec are discussed briefly at first. Then two methods of combining PKI with IPSec are proposed with details,andhow to use PKI in IPSec configuration management is also discussed. Finally,it points out that identity of IPSec com-munication entity may be the special user but not limited to IP address with PKI. It also points out that PKI makes a-thentication of IPSec entity more secure and reliable,and makes IPSec configurations more flexible.展开更多
基金This work is supported by National Natural Science Foundation of China under contract 60902008.
文摘Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in the behaviors of the network and can not deal with the problem exactly. In this paper, we start from the security of the protocol, then we propose a novel theory for security protocol analysis of Denial of Service in order to deal with the DoS attack. We first introduce the conception of weighted graph to extend the strand space model, then we extend the penetrator model and define the goal of anti-DoS attack through the conception of the DoS-stop protocol, finally we propose two kinds of DoS test model and erect the novel formal theory for security protocol analysis of Denial of Service. Our new formal theory is applied in two example protocols. It is proved that the Internet key exchange (IKE) easily suffers from the DoS attacks, and the efficient DoS- resistant secure key exchange protocol (JFK) is resistant against DoS attack for the server, respectively.
文摘PKI and IPSec are the widely used technologies in today's information security area. In this paper ,PKI andIPSec are discussed briefly at first. Then two methods of combining PKI with IPSec are proposed with details,andhow to use PKI in IPSec configuration management is also discussed. Finally,it points out that identity of IPSec com-munication entity may be the special user but not limited to IP address with PKI. It also points out that PKI makes a-thentication of IPSec entity more secure and reliable,and makes IPSec configurations more flexible.