loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock
ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS

Topics: Intrusion Detection & Prevention; Network Security; Security Information Systems Architecture and Design and Security Patterns; Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, Etc.); Security Verification and Validation

Authors: M.-Camilla Fiazza ; Michele Peroli and Luca Viganò

Affiliation: University of Verona, Italy

Keyword(s): Non-collaborative attackers, Attack interference, Dolev-Yao attacker, Attack mitigation, Security protocols.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Intrusion Detection & Prevention ; Network Security ; Security in Information Systems ; Security Information Systems Architecture and Design and Security Patterns ; Security Verification and Validation ; Wireless Network Security

Abstract: In security protocol analysis, the traditional choice to consider a single Dolev-Yao attacker is supported by the fact that models with multiple collaborating Dolev-Yao attackers have been shown to be reducible to models with one Dolev-Yao attacker. In this paper, we take a fundamentally different approach and investigate the case of multiple non-collaborating attackers. After formalizing the framework for multi-attacker scenarios, we show with a case study that concurrent competitive attacks can interfere with each other. We then present a new strategy to defend security protocols, based on active exploitation of attack interference. The paper can be seen as providing two proof-of-concept results: (i) it is possible to exploit interference to mitigate protocol vulnerabilities, thus providing a form of protection to protocols; (ii) the search for defense strategies requires scenarios with at least two attackers.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.222.23.119

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Fiazza, M.; Peroli, M. and Viganò, L. (2011). ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS. In Proceedings of the International Conference on Security and Cryptography (ICETE 2011) - SECRYPT; ISBN 978-989-8425-71-3; ISSN 2184-3236, SciTePress, pages 144-156. DOI: 10.5220/0003516801440156

@conference{secrypt11,
author={M.{-}Camilla Fiazza. and Michele Peroli. and Luca Viganò.},
title={ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2011) - SECRYPT},
year={2011},
pages={144-156},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003516801440156},
isbn={978-989-8425-71-3},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2011) - SECRYPT
TI - ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS
SN - 978-989-8425-71-3
IS - 2184-3236
AU - Fiazza, M.
AU - Peroli, M.
AU - Viganò, L.
PY - 2011
SP - 144
EP - 156
DO - 10.5220/0003516801440156
PB - SciTePress