Advertisement

Analyzing Security Protocols Using Association Rule Mining

  • Qingfeng Chen
  • Yi-Ping Phoebe Chen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3809)

Abstract

Current studies to analyzing security protocols using formal methods require users to predefine authentication goals. Besides, they are unable to discover potential correlations between secure messages. This research attempts to analyze security protocols using data mining. This is done by extending the idea of association rule mining and converting the verification of protocols into computing the frequency and confidence of inconsistent secure messages. It provides a novel and efficient way to analyze security protocols and find out potential correlations between secure messages. The conducted experiments demonstrate our approaches.

Keywords

Association Rule Frequent Itemsets Security Protocol Association Rule Mining Expiration Date 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Burrows, M., Abadi, M., Needham, R.: A logic for Authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)CrossRefGoogle Scholar
  2. 2.
    Heintze, N., Tygar, J., Wing, J., Wong, H.: Model Checking Electronic Commerce Protocols. In: Proceedings of the 2nd USENIX Workshop on Electronic Commerce, Oakland, California, pp. 147–164 (November 1996)Google Scholar
  3. 3.
    Zhang, C., Zhang, S.: Association Rule Mining. LNCS (LNAI), vol. 2307, p. 25. Springer, Heidelberg (2002)zbMATHCrossRefGoogle Scholar
  4. 4.
    Agrawal, R., Imielinski, T., Swami, A.: Database mining: A performance perspective. IEEE Transaction. Knowledge and Data Eng. 5(6), 914–925 (1993)CrossRefGoogle Scholar
  5. 5.
    Han, J., Pei, J., Yin, Y.: Mining frequent patterns without candidate generation. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 1–12 (2000)Google Scholar
  6. 6.
    Denning, D., Sacco, G.: Timestamp in Key Distribution Protocols. Communications of ACM 24(8), 533–536 (1981)CrossRefGoogle Scholar
  7. 7.
    Needham, R., Schroeder, M.: Using Encryption for Authentication in Large Networks of Computers. Comm. of the ACM 21(12), 993–999 (1978)zbMATHCrossRefGoogle Scholar
  8. 8.
    Dolev, D., Yao, A.: On the Security of Public Key Protocols. IEEE Transaction on Information Theory 29(2), 198–208 (1983)zbMATHCrossRefMathSciNetGoogle Scholar
  9. 9.
    SET Secure Electronic Transaction Specification: A Programmers Guide, http://www.setco.org/

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Qingfeng Chen
    • 1
  • Yi-Ping Phoebe Chen
    • 1
  1. 1.School of Information TechnologyDeakin UniversityMelbourneAustralia

Personalised recommendations