An environment for security protocol intrusion
Author
Yasinsac, Alec
Entry type
article
Abstract
Secure electronic communication relies on cryptography. Even with perfect encryption, communication may be compromised without effective security protocols for key exchange, authentication, etc. We are now seeing proliferation of large secure environments characterized by high volume, encrypted traffic between principals, facilitated by Public Key Infrastructures (PKI). PKI's are dependent on security protocols. Unfortunately, security protocols are susceptible to subtle errors. To date, we have relied on formal methods to tell us if security protocols are effective. These methods do not provide complete or measurable protocol security. Security protocols are also subject to the same implementation and administrative vulnerabilities as communication protocols. As a result, we will continue to operate security protocols that have flaws. In this paper, we describe a method and architecture to detect intrusions in security protocol environments such as Public Keys Infrastructures. Our method is based on classic techniques of knowledge-based and behavior-based intrusion detection systems.
Date
2002
Journal
Journal of Computer Security
Key alpha
Yasinsac
Pages
177-188
Publisher
IOS Press
School
Flordia State University Computer Science Department
Affiliation
Journal of Computer Security IOS Press
Publication Date
2002-01-01
Copyright
2002 by the IOS Press
Language
English
Location
A hard-copy of this is in the Papers Cabinet
Price
$8.00
Subject
security protocol intrusion

