Method for analyzing safety defect of network protocol

A technology for network protocol security and defect analysis, applied in electrical components, transmission systems, etc., can solve problems such as the lack of formalization of idealized steps, the lack of formalization of the determination of initial assumptions, and the lack of semantic basis for BAN logic.

Inactive Publication Date: 2011-06-22
TIANJIN UNIV
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] BAN logic lacks a precisely defined semantic basis, the determination of initial assumptions is not formalized, and the idealization steps are not formalized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for analyzing safety defect of network protocol
  • Method for analyzing safety defect of network protocol
  • Method for analyzing safety defect of network protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0027] In order to overcome the deficiencies in the prior art and meet the needs of practical applications, the embodiment of the present invention provides a network protocol security defect analysis method, see figure 1 with figure 2 , see the description below:

[0028] 101: Summarize and analyze network protocols, extract resources, behaviors and hazards involved in network protocols, summarize and abstract resources, behaviors and hazards, and acquire knowledge of network protocols;

[0029] Summarize the involved resources, behaviors, and hazards from network protocols. Network protocols vary widely due to their different functions, and therefore network attacks are of various types. However, the ideas of many network attacks ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for analyzing the safety defect of a network protocol, and relates to the field of safety software engineering. The method comprises the following steps of: analyzing and summarizing the network protocol, and extracting resources, behaviors and harms of the protocol to model the network protocol so as to form an attack rule graph; analyzing all combinations of nodes and parameters in the attack rule graph according to the attack rule graph, and finding out at least one potential attack model; improving a rule knowledge library by using a reasoning mode; and formalizing the attack model in the improved rule knowledge library to establish an alleviation scheme corresponding to the attack model, and finally generating a network protocol attack analysis report. The method provided by the invention is more intelligent; on the protocol modeling aspect, the protocol can be better understood by a computer so as to extract effective information; and the background reasoning is performed based on the rule knowledge library, so that the shortcoming of the prior art is overcome, and the demand in actual application can be met.

Description

technical field [0001] The present invention is based on secure software engineering, and in particular relates to a network protocol security defect analysis method. The method aims at network protocol security defects and attacks, and proposes a formal analysis method based on protocol modeling for attack discovery. The underlying formal modeling uses reasoning in the field of artificial intelligence, combined with knowledge rules, to obtain protocol defects and corresponding attack modes. Background technique [0002] Network protocols are rules and conventions that control computer information exchange on network transmission media. In a computer network, two entities that communicate with each other are located in different geographical locations. The two entities communicate with each other and coordinate their actions by exchanging information to achieve synchronization. The information exchange must follow a pre-agreed process. Network protocols generally include th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 李晓红余小飞邢金亮孟国柱刘丰煦胡昌
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products