Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security protocol vulnerability mining method based on multiple reverse cases

A security protocol and vulnerability mining technology, applied in electrical components, transmission systems, etc., can solve the problems of state space explosion, proof, no unified and accurate method, etc., to reduce workload, improve accuracy and efficiency.

Inactive Publication Date: 2019-09-03
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, the logical method needs to use logical language to describe the protocol before verifying the protocol, which is an idealized protocol. There is no unified and accurate method for this process, so that the formal idea cannot be carried out to the end.
In addition, since logic methods are based on assumptions and reasoning, the correctness of the assumptions will directly affect the correctness of the conclusions, but most logics fail to provide proofs of these properties
The disadvantage of the theorem proving method is: when the protocol is insecure, the method cannot give an attack path and a counterexample
The main disadvantage of the model detection method is that when the system is more complex, the state space will become very large, that is, the state space explosion problem, and the detection process may not terminate at this time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protocol vulnerability mining method based on multiple reverse cases
  • Security protocol vulnerability mining method based on multiple reverse cases
  • Security protocol vulnerability mining method based on multiple reverse cases

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] This method is extended on the basis of model detection. In the process of model detection, the concept of node weight is introduced, and the negative examples are analyzed, and the loopholes in the security protocol are discovered by synthesizing the information in multiple negative examples. The general idea is as follows: protocol modeling - model testing - eliminating similar counterexamples - analyzing numerous counterexamples and mining protocol loopholes. The specific process diagram is as follows figure 1 As shown, a detailed description is given below.

[0041] A security protocol loophole mining method based on multiple negative examples of the present invention comprises the following steps:

[0042] S1. Use the promela language to model the security protocol that needs to be verified, and save it as a .pml file format; in step S1, first use the promela language to model the security protocol. Here, the nspk protocol is taken as an example for illustration. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security protocol vulnerability mining method based on multiple reverse cases, which comprises the following steps: S1, modeling a security protocol required to be verified by using a promela language, and storing the security protocol in a .pml file format; S2, reducing the security property of a protocol, and expressing the security property in an LTL form; S3, verifying the security protocol in a manner of searching for an inverse example; S4, eliminating similar inverse cases, wherein an editing distance method is used for measuring a weight sequence of the inverse cases, and eliminating the similar inverse cases; then further eliminating similar reverse examples by using a method of comparing the attack path graphs; and S5, processing the residual reverse case set in the step S4 by using a statistical method. According to the method, a weight concept is introduced in a model detection stage, weight sequences in inverse cases are further compared, and similar inverse cases are eliminated. In the inverse case analysis stage, a statistical method is used for processing a large number of redundant inverse cases, so that the analysis process of the inversecases is more automatic, and the accuracy and efficiency of security protocol analysis are improved.

Description

technical field [0001] The invention belongs to the technical field of network space security, and in particular relates to a security protocol loophole mining method based on multiple negative examples. Background technique [0002] With the advent of the information age and the gradual improvement and maturity of computer technology, information has penetrated into every aspect of human life. From basic necessities of life to national defense, aviation, and industry, information is inseparable, and the carrier of information is the Internet. This information facilitates people's daily life, promotes social development, and promotes the progress of human economy and civilization. When there is a problem with information security, it will affect people's clothing, food, housing and transportation, and cause huge losses to the national economy and people's livelihood. To ensure information security, reliable security protocols are essential. [0003] Security protocols, also...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1433
Inventor 吴立军张卫杰李亚林
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More