...
首页> 外文期刊>Pervasive and Mobile Computing >Modeling and verifying EPC network intrusion system based on timed automata
【24h】

Modeling and verifying EPC network intrusion system based on timed automata

机译:基于定时自动机的EPC网络入侵系统建模与验证

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Nowadays, the EPC network has been gradually popularized to manufacturing intelligent, retailing and logistics. Due to the widespread use of EPC networks, the security problem therefore, becomes particularly important. In order to obtain the proper defense strategy, we propose a modeling method for EPC network intrusion system. First, we describe the network entities in EPC network, and classify them into detected network entities and attacked network entities. Then, we analyze the intrusion for EPC network, and categorize the existing attack methods for EPC network into two categories: atomic attacks and combined attacks. The atomic attacks include vulnerability detection, attack execution, and attack decision. Based on timed automata, we introduce the formal description of the network environment into the modeling of EPC network intrusion system, and thus construct an intrusion model which gives a formal description of attacks. Our intrusion model can represent the time properties, constraints of network environment and intrusion behaviors. Finally, we verify the correctness of our proposed model in terms of the model checking tool UP-PAAL, and compare it with other typical attacking models to show the comprehensiveness and integrity of our proposed model. Besides, we change the value of clock parameter, gain the durations of different intrusion actions and use these data to set the defense strategy. (C) 2015 Elsevier B.V. All rights reserved.
机译:如今,EPC网络已逐渐普及到制造智能,零售和物流领域。由于EPC网络的广泛使用,因此安全问题变得尤为重要。为了获得适当的防御策略,我们提出了一种EPC网络入侵系统的建模方法。首先,我们描述EPC网络中的网络实体,并将它们分为检测到的网络实体和被攻击的网络实体。然后,我们对EPC网络的入侵进行了分析,并将现有的EPC网络攻击方法分为两类:原子攻击和组合攻击。原子攻击包括漏洞检测,攻击执行和攻击决策。在定时自动机的基础上,将网络环境的形式化描述引入到EPC网络入侵系统的建模中,从而构造了一个对攻击进行形式化描述的入侵模型。我们的入侵模型可以表示时间属性,网络环境的约束和入侵行为。最后,我们使用模型检查工具UP-PAAL验证了我们提出的模型的正确性,并将其与其他典型的攻击模型进行了比较,以显示我们提出的模型的全面性和完整性。此外,我们更改时钟参数的值,获取不同入侵行为的持续时间,并使用这些数据来设置防御策略。 (C)2015 Elsevier B.V.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号