Customizing Protocol Specifications for Detecting Resource Exhaustion and Guessing Attacks.
Bogdan GrozaMarius MineaPublished in: FMCO (2010)
Keyphrases
- security protocols
- cryptographic protocols
- secure routing
- denial of service attacks
- detecting malicious
- protocol specification
- end hosts
- network intrusion detection systems
- resource allocation
- high level
- countermeasures
- security mechanisms
- digital libraries
- cryptographic algorithms
- resource management
- lightweight
- security threats
- state machines
- attack scenarios
- detect malicious
- delay insensitive
- traffic analysis
- malicious activities
- model checker
- communication protocol
- authentication protocol
- resource constraints
- intrusion detection
- web services