Title :
Using CSP to model and analyze Transmission Control Protocol vulnerabilities within the broadcast network
Author :
Shahriari, Hamid Reza ; Jalili, Rasool
Author_Institution :
Dept. of Comput. Eng., Sharif Univ. of Technol., Tehran, Iran
Abstract :
The spread of networks and their increasing complexity have complicated the task of security analysis. Accordingly, automatic verification approaches have received more attention recently. We have modeled a network, including a set of hosts (clients and servers), using the process algebra CSP (communicating sequential processes) in order to verify the Transmission Control Protocol (TCP) behavior against an active intruder. The model is verified using the FDR tool and, as a result, some attack scenarios which violate security are found. The scenarios show how an intruder can compromise the server trust to its clients. As the model is modular, extendable, and scalable, more complex attack scenarios (combinations of simple ones) can be detected using it.
Keywords :
authorisation; broadcasting; client-server systems; communicating sequential processes; telecommunication security; transport protocols; TCP; Transmission Control Protocol vulnerabilities; active intruder; automatic verification; broadcast network; clients; communicating sequential processes; process algebra CSP; security analysis; security attacks; server trust; servers; Algebra; Automatic control; Broadcasting; Chip scale packaging; Computer networks; Computer security; Cryptographic protocols; Intrusion detection; Network servers; TCPIP;
Conference_Titel :
Networking and Communication Conference, 2004. INCC 2004. International
Print_ISBN :
0-7803-8325-7
DOI :
10.1109/INCC.2004.1366574