首页> 外文会议>International conference on networks communications >Intrusion Detection In Zero Knowledge System Using Model Checking Approach
【24h】

Intrusion Detection In Zero Knowledge System Using Model Checking Approach

机译:零知识系统中基于模型检查的入侵检测

获取原文

摘要

The number of services provided to the modern users of todays' generation is countless and ever increasing. However, most of these services require the user to login with a username and a password. These sensitive information has to be sent across the network, which is highly insecure, and can be tapped by any unauthorized individual without much difficulty. The Zero Knowledge protocol provides authentication without the need to send any private and confidential information across the network. Only mathematical computations on these confidential information have to be sent across. In this paper, we have modeled the general working of the Zero Knowledge system by considering the various states that a prover (sender) and a verifier (receiver) will be in during the execution of the protocol, and have proved that the authentication of the prover is possible. Zero Knowledge system is usually considered to be unintrudeable, but that does not stop hackers from attempting to intrude this protocol. So in this paper, we have also considered the various states that an intruder will be in while intruding, and have shown that it is possible for the user to detect if somebody is trying to intrude the Zero Knowledge system. The tool used to model the system is NuSMV.
机译:为当今时代的现代用户提供的服务数量是无数且不断增加。但是,大多数这些服务都要求用户使用用户名和密码登录。这些敏感信息必须通过网络发送,这是高度不安全的,任何未经授权的个人都可以轻而易举地利用它们。零知识协议可提供身份验证,而无需通过网络发送任何私有和机密信息。只需对这些机密信息进行数学计算即可。在本文中,我们通过考虑协议执行期间证明者(发送者)和验证者(接收者)所处的各种状态,对零知识系统的总体工作进行了建模,并证明了对证明者是可能的。零知识系统通常被认为是不可入侵的,但这并不能阻止黑客尝试入侵该协议。因此,在本文中,我们还考虑了入侵​​者在入侵时所处的各种状态,并表明用户可以检测是否有人试图入侵零知识系统。用于对系统建模的工具是NuSMV。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号