Loading...

Using CSP to model and analyze transmission control protocol vulnerabilities within the broadcast network

Shahriari, H. R ; Sharif University of Technology | 2004

119 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/INCC.2004.1366574
  3. Publisher: 2004
  4. Abstract:
  5. Spreading networks and increasing their complexity has complicated the task of security analysis. Accordingly, automatic verification approaches have received more attention recently. In this paper, we modeled a network including a set of hosts (clients and servers) using the process algebra CSP in order to verify the Transmission Control Protocol (TCP) behavior against an active intruder. The model is verified using the FDR tool and as a result, some attack scenarios violating the security are found. The scenarios showes how an intruder can compromise the server trust to its clients. As the model is modular, extendable, and scalable, more complex attack scenarios (combination of simple ones) can be detected using the model
  6. Keywords:
  7. Attack ; Security modeling and verification ; TCP ; Vulnerability Analysis
  8. Source: Proceedings - 2004 International Networking and Communication Conference, INCC 2004, Lahore, 11 June 2004 through 13 June 2004 ; 2004 , Pages 42-47 ; 0780383257 (ISBN)
  9. URL: https://ieeexplore.ieee.org/document/1366574