• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhuo Jiliang, Li Xianxian, Li Jianxin, and Huai Jinpeng. A New Taxonomy of Attacks on Security Protocols and Their Security Evaluation[J]. Journal of Computer Research and Development, 2005, 42(7): 1100-1107.
Citation: Zhuo Jiliang, Li Xianxian, Li Jianxin, and Huai Jinpeng. A New Taxonomy of Attacks on Security Protocols and Their Security Evaluation[J]. Journal of Computer Research and Development, 2005, 42(7): 1100-1107.

A New Taxonomy of Attacks on Security Protocols and Their Security Evaluation

More Information
  • Published Date: July 14, 2005
  • Security analysis and evaluation for security protocols are very important, yet it is usually hard to carry out. Almost all the existing research work concentrates on analyzing certain security properties of protocols on the open network environment, such as secrecy and authentication. To evaluate security protocols on capabilities of defending attacks more comprehensively, the classification of intruders' abilities is studied, and a new taxonomy of attacks on security protocols based on both intruders' capabilities and attack consequences is also presented. With the classification, the corresponding characteristics and mechanisms of every attack type are analyzed. Finally, a security evaluation framework for security protocols based on the 2-dimensions taxonomy is discussed, which helps to objectively evaluate capabilities of preventing attacks on security protocols and also helps to design new security protocols.
  • Related Articles

    [1]Jin Ge, Wei Xiaochao, Wei Senmao, Wang Hao. FPCBC: Federated Learning Privacy Preserving Classification System Based on Crowdsourcing Aggregation[J]. Journal of Computer Research and Development, 2022, 59(11): 2377-2394. DOI: 10.7544/issn1000-1239.20220528
    [2]Ju Zhuoya, Wang Zhihai. A Bayesian Classification Algorithm Based on Selective Patterns[J]. Journal of Computer Research and Development, 2020, 57(8): 1605-1616. DOI: 10.7544/issn1000-1239.2020.20200196
    [3]Fu Junjie, Liu Gongshen. A GEV-Based Classification Algorithm for Imbalanced Data[J]. Journal of Computer Research and Development, 2018, 55(11): 2361-2371. DOI: 10.7544/issn1000-1239.2018.20170514
    [4]Song Pan, Jing Liping. Exploiting Label Relationships in Multi-Label Classification with Neural Networks[J]. Journal of Computer Research and Development, 2018, 55(8): 1751-1759. DOI: 10.7544/issn1000-1239.2018.20180362
    [5]Gao Yunlong, Zuo Wanli, Wang Ying, Wang Xin. Sentence Classification Model Based on Sparse and Self-Taught Convolutional Neural Networks[J]. Journal of Computer Research and Development, 2018, 55(1): 179-187. DOI: 10.7544/issn1000-1239.2018.20160784
    [6]Huo Weigang, Shao Xiuli. A Fuzzy Associative Classification Method Based on Multi-Objective Evolutionary Algorithm[J]. Journal of Computer Research and Development, 2011, 48(4): 567-575.
    [7]Zou Quan, Guo Maozu, Liu Yang, and Wang Jun. A Classification Method for Class-Imbalanced Data and Its Application on Bioinformatics[J]. Journal of Computer Research and Development, 2010, 47(8): 1407-1414.
    [8]Ao Fujiang, Wang Tao, Liu Baohong, Huang Kedi. CBC-DS: A Classification Algorithm Based on Closed Frequent Patterns for Mining Data Streams[J]. Journal of Computer Research and Development, 2009, 46(5): 779-786.
    [9]Zhang Maoyuan, Zou Chunyan, Lu Zhengding. A Fuzzy Classification of Web Pages Based on the Transposition-Learning Rule[J]. Journal of Computer Research and Development, 2007, 44(1): 99-104.
    [10]Ge Weiping, Wang Wei, Zhou Haofeng, and Shi Baile. Privacy Preserving Classification Mining[J]. Journal of Computer Research and Development, 2006, 43(1): 39-45.

Catalog

    Article views (1042) PDF downloads (1568) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return