Network securing against threatening requests

DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security(2011)

引用 7|浏览2
暂无评分
摘要
Networked systems mainly consists of autonomous components conforming to the network protocols. Those concurrent and networked components are potentially to be attacked by malicious users. They have to implement some mechanisms to avoid the possible threatening requests aimed at disrupting or crashing the system, and then provoke some denial of service attack. In this paper, we address this problem. We suggest a method to model this kind of components and we propose a robustness testing approach to evaluate the system security. A new definition of Glued_IOLTS is used to define this kind of system and an algorithm for robustness testing cases generation is given. A case study with the RADIUS protocol is presented.
更多
查看译文
关键词
autonomous component,system security,networked component,robustness testing approach,malicious user,network protocol,robustness testing cases generation,networked system,case study,radius protocol
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要