Pretražite po imenu i prezimenu autora, mentora, urednika, prevoditelja

Napredna pretraga

Pregled bibliografske jedinice broj: 997938

Resource-Bounded Intruders in Denial of Service Attacks


Urquiza, Abraão Aires; Alturki, Musab A.; Kanovich, Max; Ban Kirigin, Tajana; Nigam, Vivek; Scedrov, Andre; Talcott, Carolyn
Resource-Bounded Intruders in Denial of Service Attacks // 2019 IEEE 32nd Computer Security Foundations Symposium (CSF) / Delaune, S. ; Jia, L. (ur.).
Hoboken (NJ), Sjedinjene Američke Države: Institute of Electrical and Electronics Engineers (IEEE), 2019. str. 382-396 doi:10.1109/CSF.2019.00033 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)


CROSBI ID: 997938 Za ispravke kontaktirajte CROSBI podršku putem web obrasca

Naslov
Resource-Bounded Intruders in Denial of Service Attacks

Autori
Urquiza, Abraão Aires ; Alturki, Musab A. ; Kanovich, Max ; Ban Kirigin, Tajana ; Nigam, Vivek ; Scedrov, Andre ; Talcott, Carolyn

Vrsta, podvrsta i kategorija rada
Radovi u zbornicima skupova, cjeloviti rad (in extenso), znanstveni

Izvornik
2019 IEEE 32nd Computer Security Foundations Symposium (CSF) / Delaune, S. ; Jia, L. - : Institute of Electrical and Electronics Engineers (IEEE), 2019, 382-396

ISBN
978-172811406-4

Skup
32nd IEEE Computer Security Foundations Symposium

Mjesto i datum
Hoboken (NJ), Sjedinjene Američke Države, 25.06.2019. - 28.06.2019

Vrsta sudjelovanja
Predavanje

Vrsta recenzije
Međunarodna recenzija

Ključne riječi
Denial of Serice Attacks ; Multiset Rewriting ; Security Protocols ; Dolev-Yao Intruder ; Computational Complexity

Sažetak
Denial of Service (DoS) attacks have been a serious security concern, as no service is, in principle, protected against them. Although a Dolev-Yao intruder with unlimited resources can trivially render any service unavailable, DoS attacks do not necessarily have to be carried out by such (extremely) powerful intruders. It is useful in practice and more challenging for formal protocol verification to determine whether a service is vulnerable even to resource-bounded intruders that cannot generate or intercept arbitrary large volumes of traffic. This paper proposes a novel, more refined intruder model where the intruder can only consume at most some specified amount of resources in any given time window. Additionally, we propose protocol theories that may contain timeouts and specify service resource usage during protocol execution. In contrast to the existing resource-conscious protocol verification models, our model allows finer and more subtle analysis of DoS problems. We illustrate the power of our approach by representing a number of classes of DoS attacks, such as, Slow, Asymmetric and Amplification DoS attacks, exhausting different types of resources of the target, such as, number of workers, processing power, memory, and network bandwith. We show that the proposed DoS problem is undecidable in general and is PSPACE-complete for the class of resource- bounded, balanced systems. Finally, we implemented our formal verification model in the rewriting logic tool Maude and analyzed a number of DoS attacks in Maude using Rewriting Modulo SMT in an automated fashion.

Izvorni jezik
Engleski

Znanstvena područja
Matematika, Računarstvo



POVEZANOST RADA


Projekti:
HRZZ-UIP-05-2017-9219 - Formalno rasuđivanje i semantike (FORMALS) (Perkov, Tin, HRZZ - 2017-05) ( CroRIS)

Ustanove:
Sveučilište u Rijeci, Fakultet za matematiku

Profili:

Avatar Url Tajana Ban Kirigin (autor)

Poveznice na cjeloviti tekst rada:

doi ieeexplore.ieee.org

Citiraj ovu publikaciju:

Urquiza, Abraão Aires; Alturki, Musab A.; Kanovich, Max; Ban Kirigin, Tajana; Nigam, Vivek; Scedrov, Andre; Talcott, Carolyn
Resource-Bounded Intruders in Denial of Service Attacks // 2019 IEEE 32nd Computer Security Foundations Symposium (CSF) / Delaune, S. ; Jia, L. (ur.).
Hoboken (NJ), Sjedinjene Američke Države: Institute of Electrical and Electronics Engineers (IEEE), 2019. str. 382-396 doi:10.1109/CSF.2019.00033 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)
Urquiza, A., Alturki, M., Kanovich, M., Ban Kirigin, T., Nigam, V., Scedrov, A. & Talcott, C. (2019) Resource-Bounded Intruders in Denial of Service Attacks. U: Delaune, S. & Jia, L. (ur.)2019 IEEE 32nd Computer Security Foundations Symposium (CSF) doi:10.1109/CSF.2019.00033.
@article{article, author = {Urquiza, Abra\~{a}o Aires and Alturki, Musab A. and Kanovich, Max and Ban Kirigin, Tajana and Nigam, Vivek and Scedrov, Andre and Talcott, Carolyn}, year = {2019}, pages = {382-396}, DOI = {10.1109/CSF.2019.00033}, keywords = {Denial of Serice Attacks, Multiset Rewriting, Security Protocols, Dolev-Yao Intruder, Computational Complexity}, doi = {10.1109/CSF.2019.00033}, isbn = {978-172811406-4}, title = {Resource-Bounded Intruders in Denial of Service Attacks}, keyword = {Denial of Serice Attacks, Multiset Rewriting, Security Protocols, Dolev-Yao Intruder, Computational Complexity}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, publisherplace = {Hoboken (NJ), Sjedinjene Ameri\v{c}ke Dr\v{z}ave} }
@article{article, author = {Urquiza, Abra\~{a}o Aires and Alturki, Musab A. and Kanovich, Max and Ban Kirigin, Tajana and Nigam, Vivek and Scedrov, Andre and Talcott, Carolyn}, year = {2019}, pages = {382-396}, DOI = {10.1109/CSF.2019.00033}, keywords = {Denial of Serice Attacks, Multiset Rewriting, Security Protocols, Dolev-Yao Intruder, Computational Complexity}, doi = {10.1109/CSF.2019.00033}, isbn = {978-172811406-4}, title = {Resource-Bounded Intruders in Denial of Service Attacks}, keyword = {Denial of Serice Attacks, Multiset Rewriting, Security Protocols, Dolev-Yao Intruder, Computational Complexity}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, publisherplace = {Hoboken (NJ), Sjedinjene Ameri\v{c}ke Dr\v{z}ave} }

Citati:





    Contrast
    Increase Font
    Decrease Font
    Dyslexic Font