Journal on Communications ›› 2016, Vol. 37 ›› Issue (6): 75-85.doi: 10.11959/j.issn.1000-436x.2016293

• Papers • Previous Articles     Next Articles

Monitoring approach for online security of cryptographic protocol

Yu-na ZHU1,2,Ji-hong HAN1,Lin YUAN1,Yu-dan FAN1,Han-tuo CHEN1,Wen GU1   

  1. 1 The Third College,PLA Information Engineering University,Zhengzhou 450001,China
    2 Troops 91033 of PLA,Qingdao 266035,China
  • Online:2016-06-25 Published:2016-07-28
  • Supported by:
    The National Natural Science Foundation of China

Abstract:

Previous methods can not detect the low-interaction attacks of protocol logic.A cryptographic protocol online monitoring approach named CPOMA was presented.An ontology framework of cryptographic protocol features was constructed for the unified description of cryptographic protocol features with different types.Based on the framework,a feature weighting method was proposed by fuzzy subspace clustering first,and the individualized feature database of cryptographic protocols was built.On this basis,a self-learning method was presented for protocol identification and session rebuilding,and then abnormal protocol sessions were detected online.Experimental results show that CPOMA can identify protocols,rebuild sessions,detect abnormal sessions efficiently,and can improve the online security of cryptographic protocols.

Key words: cryptographic protocol identification, session rebuilding, online security, ontology, subspace clustering

No Suggested Reading articles found!