Skip to main content

Network Securing against Threatening Requests

  • Conference paper
Data Privacy Management and Autonomous Spontaneus Security (DPM 2011, SETOP 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7122))

Abstract

Networked systems mainly consists of autonomous components conforming to the network protocols. Those concurrent and networked components are potentially to be attacked by malicious users. They have to implement some mechanisms to avoid the possible threatening requests aimed at disrupting or crashing the system, and then provoke some denial of service attack. In this paper, we address this problem. We suggest a method to model this kind of components and we propose a robustness testing approach to evaluate the system security. A new definition of Glued_IOLTS is used to define this kind of system and an algorithm for robustness testing cases generation is given. A case study with the RADIUS protocol is presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bliudze, S., Sifakis, J.: A Notion of Glue Expressiveness for Component-Based Systems. In: van Breugel, F., Chechik, M. (eds.) CONCUR 2008. LNCS, vol. 5201, pp. 508–522. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  2. Kone, O., Castanet, R.: Test generation for interworking systems. Computer Communications, 642–652 (1999)

    Google Scholar 

  3. Gotzhein, R., Khendek, F.: Compositional Testing of Communication Systems. In: Uyar, M.Ü., Duale, A.Y., Fecko, M.A. (eds.) TestCom 2006. LNCS, vol. 3964, pp. 227–244. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. Ansay, T.: Compositional testing of communication systems-tools and case studies. Master’s thesis, Concordia University (2008)

    Google Scholar 

  5. Lei, B., Li, X., Liu, Z.: Robustness testing for software components. Science of Computer Programming, 879–897 (2010)

    Google Scholar 

  6. Khorchef, S.: Un Cardre Formel pour le Test de Robustesse des Protocols de Communication. PhD thesis, University of Bordeaux 1 (2007)

    Google Scholar 

  7. Offutt, A.J., Liu, S., Abdurazik, A.: Geneartion testing data from state-based specification. Software Testing, Verification and Reliability, 25–53 (2003)

    Google Scholar 

  8. Lai, R.: A survey of communication protocol testing. The Journal of Systems and Software, 21–46 (2001)

    Google Scholar 

  9. Desmoulin, A., Viho, C.: Interoperability test generation: Formal definitions and algorithm. In: ARIMA-Numero Special CARI 2006, pp. 49–63 (2006)

    Google Scholar 

  10. Castanet, R., Kone, O., Zarkouna, K.B.: Tests de robustesse. tech. rep., LaBRI, IRIT (2003)

    Google Scholar 

  11. Tretmans, J.: Conformance testing with labelled transition system: Implementation relations and test generation. In: Computer Networks and ISDN Systems, pp. 49–76 (1996)

    Google Scholar 

  12. Rigney, C., Willens, S., Rubens, A.: Remote authentication dial in user service (radius). tech. rep., The Internet Society (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fu, Y., Kone, O. (2012). Network Securing against Threatening Requests. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds) Data Privacy Management and Autonomous Spontaneus Security. DPM SETOP 2011 2011. Lecture Notes in Computer Science, vol 7122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28879-1_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28879-1_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28878-4

  • Online ISBN: 978-3-642-28879-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics