Monitoring approach for online security of cryptographic protocol
Previous methods can not detect the low-interaction attacks of protocol logic.A cryptographic protocol online monitoring approach named CPOMA was presented.An ontology framework of cryptographic protocol features was constructed for the unified description of cryptographic protocol features with dif...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2016-06-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016293/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539565284753408 |
---|---|
author | Yu-na ZHU Ji-hong HAN Lin YUAN Yu-dan FAN Han-tuo CHEN Wen GU |
author_facet | Yu-na ZHU Ji-hong HAN Lin YUAN Yu-dan FAN Han-tuo CHEN Wen GU |
author_sort | Yu-na ZHU |
collection | DOAJ |
description | Previous methods can not detect the low-interaction attacks of protocol logic.A cryptographic protocol online monitoring approach named CPOMA was presented.An ontology framework of cryptographic protocol features was constructed for the unified description of cryptographic protocol features with different types.Based on the framework,a feature weighting method was proposed by fuzzy subspace clustering first,and the individualized feature database of cryptographic protocols was built.On this basis,a self-learning method was presented for protocol identification and session rebuilding,and then abnormal protocol sessions were detected online.Experimental results show that CPOMA can identify protocols,rebuild sessions,detect abnormal sessions efficiently,and can improve the online security of cryptographic protocols. |
format | Article |
id | doaj-art-3b5a6cb6b2a94b8892769877e046a397 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2016-06-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-3b5a6cb6b2a94b8892769877e046a3972025-01-14T06:55:35ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2016-06-0137758559701572Monitoring approach for online security of cryptographic protocolYu-na ZHUJi-hong HANLin YUANYu-dan FANHan-tuo CHENWen GUPrevious methods can not detect the low-interaction attacks of protocol logic.A cryptographic protocol online monitoring approach named CPOMA was presented.An ontology framework of cryptographic protocol features was constructed for the unified description of cryptographic protocol features with different types.Based on the framework,a feature weighting method was proposed by fuzzy subspace clustering first,and the individualized feature database of cryptographic protocols was built.On this basis,a self-learning method was presented for protocol identification and session rebuilding,and then abnormal protocol sessions were detected online.Experimental results show that CPOMA can identify protocols,rebuild sessions,detect abnormal sessions efficiently,and can improve the online security of cryptographic protocols.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016293/cryptographic protocol identificationsession rebuildingonline securityontologysubspace clustering |
spellingShingle | Yu-na ZHU Ji-hong HAN Lin YUAN Yu-dan FAN Han-tuo CHEN Wen GU Monitoring approach for online security of cryptographic protocol Tongxin xuebao cryptographic protocol identification session rebuilding online security ontology subspace clustering |
title | Monitoring approach for online security of cryptographic protocol |
title_full | Monitoring approach for online security of cryptographic protocol |
title_fullStr | Monitoring approach for online security of cryptographic protocol |
title_full_unstemmed | Monitoring approach for online security of cryptographic protocol |
title_short | Monitoring approach for online security of cryptographic protocol |
title_sort | monitoring approach for online security of cryptographic protocol |
topic | cryptographic protocol identification session rebuilding online security ontology subspace clustering |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016293/ |
work_keys_str_mv | AT yunazhu monitoringapproachforonlinesecurityofcryptographicprotocol AT jihonghan monitoringapproachforonlinesecurityofcryptographicprotocol AT linyuan monitoringapproachforonlinesecurityofcryptographicprotocol AT yudanfan monitoringapproachforonlinesecurityofcryptographicprotocol AT hantuochen monitoringapproachforonlinesecurityofcryptographicprotocol AT wengu monitoringapproachforonlinesecurityofcryptographicprotocol |