FORMALIZATION OF BROADCAST COMMUNICATION IN
PROCESS CALCULUS AND ITS MODEL CHECKING
Ritsuya Ikeda, Takuya Ohata and Shin-ya Nishizaki
Department of Computer Science, Tokyo Insititute of Technology, 2-12-1-W8-69, O-okayama, Meguro, Japan
Keywords: Automated reasoning, Model checking, Broadcast communication, Process calculus, Pi-calculus, Model
checking, Model checker SPIN.
Abstract: A large number of studies have examined communicating processes in formalizing concurrent systems for
unicast communications. We propose a process calculus to enable formalizing communicating processes
and their computational costs to analyze denial-of-service attack resistance by estimating the cost balance
between a victim and attackers. Our system is similar to other process calculi in that it is based on unicast
communication. Broadcast communication is also important in the context of denial-of-service attack resis-
tance because several denial-of-service attack methods, such as the Smurf attack, use broadcast communica-
tions. Little is known about the formal framework of broadcast communicating processes. In this paper, we
formalize broadcast communication in the framework of process calculus and apply it to an analysis of
denial-of-service attack resistance of communicating processes via broadcast communication. We propose
an extension of the proposed process calculus and an analysis method that uses the SPIN model checker.
We give two examples of broadcast communication and verify several properties using the SPIN model
checker
1 INTRODUCTION
The formalization of communicating processes has
been the object of study for a long time. One of the
most important frameworks is the pi-calculus (Miln-
er et al., 1992) (Sangiorgi et al. 2004), a system that
formalizes communi-cating processes. In that calcu-
lus, communication between processes is allowed to
be point-to-point or unidirectional; the calculus does
not support broad-cast communication. The spi-
calculus was proposed to formulate and analyze the
security of communication protocols enhanced by
adding cryptographic constructs like public-key en-
cryption, shared-key encryption, and hashing (Abadi
and Gordon, 1997).
A denial-of-service (DoS) attack is an at-tempt to
make a computer service unavailable to its users.
The first study of the formalization of DoS attacks
on communications protocols and resistance against
such attacks was performed by Meadows (2001).
She extended the Alice-and-Bob notation by anno-
tating the computational costs in processing data
packets. Although the property was deeply related to
operational behavior, cost annotation was assigned
to each communication operation independently of
the operational behavior. We therefore proposed
another formal framework called spice calculus; this
is based on process calculi where the cost estimation
mechanism is linked to operational behavior (Tomi-
oka et al., 2004). We can use this calculus success-
fully to formalize DoS attack resistance; however, it
can only handle point-to-point communication, not
broadcast communication.
In this paper, we study the formalization of
broadcast communication in spice calculus and a
verification method using model checking.
2 FORMALIZATION OF
BROADCASTING
Broadcasting is the transmission of a message to be
received by all hosts in a network. It is supported by
several network protocols such as Ethernet, token
ring, and IPv4. On the other hand, point-to-point
transmission is called unicasting.
Some DoS attacks on communication protocols
use broadcasting as a packet amplifier to overwhelm
a victim. The most typical of these is the Smurf at-
tack, in which an attacker sends ICMP echo requests
348
Ikeda R., Ohata T. and Nishizaki S. (2009).
FORMALIZATION OF BROADCAST COMMUNICATION IN PROCESS CALCULUS AND ITS MODEL CHECKING.
In Proceedings of the 4th International Conference on Software and Data Technologies, pages 348-352
DOI: 10.5220/0002276703480352
Copyright
c
SciTePress