Monitoring approach for online security of cryptographic protocol

Previous methods can not detect the low-interaction attacks of protocol logic.A cryptographic protocol online monitoring approach named CPOMA was presented.An ontology framework of cryptographic protocol features was constructed for the unified description of cryptographic protocol features with dif...

Full description

Saved in:
Bibliographic Details
Main Authors: Yu-na ZHU, Ji-hong HAN, Lin YUAN, Yu-dan FAN, Han-tuo CHEN, Wen GU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2016-06-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016293/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539565284753408
author Yu-na ZHU
Ji-hong HAN
Lin YUAN
Yu-dan FAN
Han-tuo CHEN
Wen GU
author_facet Yu-na ZHU
Ji-hong HAN
Lin YUAN
Yu-dan FAN
Han-tuo CHEN
Wen GU
author_sort Yu-na ZHU
collection DOAJ
description Previous methods can not detect the low-interaction attacks of protocol logic.A cryptographic protocol online monitoring approach named CPOMA was presented.An ontology framework of cryptographic protocol features was constructed for the unified description of cryptographic protocol features with different types.Based on the framework,a feature weighting method was proposed by fuzzy subspace clustering first,and the individualized feature database of cryptographic protocols was built.On this basis,a self-learning method was presented for protocol identification and session rebuilding,and then abnormal protocol sessions were detected online.Experimental results show that CPOMA can identify protocols,rebuild sessions,detect abnormal sessions efficiently,and can improve the online security of cryptographic protocols.
format Article
id doaj-art-3b5a6cb6b2a94b8892769877e046a397
institution Kabale University
issn 1000-436X
language zho
publishDate 2016-06-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-3b5a6cb6b2a94b8892769877e046a3972025-01-14T06:55:35ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2016-06-0137758559701572Monitoring approach for online security of cryptographic protocolYu-na ZHUJi-hong HANLin YUANYu-dan FANHan-tuo CHENWen GUPrevious methods can not detect the low-interaction attacks of protocol logic.A cryptographic protocol online monitoring approach named CPOMA was presented.An ontology framework of cryptographic protocol features was constructed for the unified description of cryptographic protocol features with different types.Based on the framework,a feature weighting method was proposed by fuzzy subspace clustering first,and the individualized feature database of cryptographic protocols was built.On this basis,a self-learning method was presented for protocol identification and session rebuilding,and then abnormal protocol sessions were detected online.Experimental results show that CPOMA can identify protocols,rebuild sessions,detect abnormal sessions efficiently,and can improve the online security of cryptographic protocols.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016293/cryptographic protocol identificationsession rebuildingonline securityontologysubspace clustering
spellingShingle Yu-na ZHU
Ji-hong HAN
Lin YUAN
Yu-dan FAN
Han-tuo CHEN
Wen GU
Monitoring approach for online security of cryptographic protocol
Tongxin xuebao
cryptographic protocol identification
session rebuilding
online security
ontology
subspace clustering
title Monitoring approach for online security of cryptographic protocol
title_full Monitoring approach for online security of cryptographic protocol
title_fullStr Monitoring approach for online security of cryptographic protocol
title_full_unstemmed Monitoring approach for online security of cryptographic protocol
title_short Monitoring approach for online security of cryptographic protocol
title_sort monitoring approach for online security of cryptographic protocol
topic cryptographic protocol identification
session rebuilding
online security
ontology
subspace clustering
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016293/
work_keys_str_mv AT yunazhu monitoringapproachforonlinesecurityofcryptographicprotocol
AT jihonghan monitoringapproachforonlinesecurityofcryptographicprotocol
AT linyuan monitoringapproachforonlinesecurityofcryptographicprotocol
AT yudanfan monitoringapproachforonlinesecurityofcryptographicprotocol
AT hantuochen monitoringapproachforonlinesecurityofcryptographicprotocol
AT wengu monitoringapproachforonlinesecurityofcryptographicprotocol