A framework for protocol vulnerability condition detection

Yuxin Meng, Lam-For Kwok

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

1 Citation (Scopus)

Abstract

Intrusion detection system (IDS) detects an intrusion by comparing with its attack signatures. The generation of IDS signatures is based on the analysis of attack traffic, which is a result of exploiting vulnerabilities in a network protocol. Thus, the protocol analysis becomes an effective method to find out protocol vulnerabilities with regard to IDS. But the problem of protocol analysis in IDS is that how to detect all protocol vulnerability conditions in protocols. In this paper, we propose a novel framework to identify protocol vulnerability conditions by utilizing existing protocol analysis techniques. In particular,there are three major analysis steps in our framework: protocol semantic analysis, protocol implementation analysis and protocol state transition sub-condition analysis. In the final step of our framework, we illustrate the use of deletion, addition and modification operations with the purpose of generating all potential protocol vulnerability conditions from the normal protocol transition conditions. Experimental results show that this framework is encouraging and feasible.
Original languageEnglish
Title of host publicationSECURWARE 2011 - 5th International Conference on Emerging Security Information, Systems and Technologies
Pages91-96
Publication statusPublished - 2011
Event5th International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2011 - Nice/Saint Laurent du Var, France
Duration: 21 Aug 201127 Aug 2011

Conference

Conference5th International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2011
Country/TerritoryFrance
CityNice/Saint Laurent du Var
Period21/08/1127/08/11

Research Keywords

  • Intrusion detection
  • Vulnerability analysis

Fingerprint

Dive into the research topics of 'A framework for protocol vulnerability condition detection'. Together they form a unique fingerprint.

Cite this