Analyzing Security Protocols Using Association Rule Mining
Current studies to analyzing security protocols using formal methods require users to predefine authentication goals. Besides, they are unable to discover potential correlations between secure messages. This research attempts to analyze security protocols using data mining. This is done by extending the idea of association rule mining and converting the verification of protocols into computing the frequency and confidence of inconsistent secure messages. It provides a novel and efficient way to analyze security protocols and find out potential correlations between secure messages. The conducted experiments demonstrate our approaches.
KeywordsAssociation Rule Frequent Itemsets Security Protocol Association Rule Mining Expiration Date
Unable to display preview. Download preview PDF.
- 2.Heintze, N., Tygar, J., Wing, J., Wong, H.: Model Checking Electronic Commerce Protocols. In: Proceedings of the 2nd USENIX Workshop on Electronic Commerce, Oakland, California, pp. 147–164 (November 1996)Google Scholar
- 5.Han, J., Pei, J., Yin, Y.: Mining frequent patterns without candidate generation. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 1–12 (2000)Google Scholar
- 9.SET Secure Electronic Transaction Specification: A Programmers Guide, http://www.setco.org/