Network securing against threatening requests

  • Authors:
  • Yulong Fu;Ousmane Kone

  • Affiliations:
  • University of PAU and Academy of Bordeaux, France;University of PAU and Academy of Bordeaux, France

  • Venue:
  • DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Networked systems mainly consists of autonomous components conforming to the network protocols. Those concurrent and networked components are potentially to be attacked by malicious users. They have to implement some mechanisms to avoid the possible threatening requests aimed at disrupting or crashing the system, and then provoke some denial of service attack. In this paper, we address this problem. We suggest a method to model this kind of components and we propose a robustness testing approach to evaluate the system security. A new definition of Glued_IOLTS is used to define this kind of system and an algorithm for robustness testing cases generation is given. A case study with the RADIUS protocol is presented.