Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Feasibility of multi-protocol attacks
Cremers C.  Availability, reliability and security (Proceedings of the First International Conference on Availability, Reliability and Security (ARES’06), Apr 20-22, 2006)287-294.2006.Type:Proceedings
Date Reviewed: Mar 14 2007

The relatively new topic of multiprotocol attacks is the focus of this well-researched paper. Until now, most studies of this kind have analyzed the effects of attacks through a single protocol. However, it has been found that protocols that are stable in isolation can have a lot of vulnerability when attacked in the context of several coexisting protocols.

It is well known that if all of the coexisting protocols that use the same network and key infrastructure satisfy certain requirements, such as sufficiently different message structures, compositionality of the individual security properties is guaranteed. However, most of the time, in practice, these properties are not followed by the coexisting protocols. Therefore, studying multiprotocol attacks becomes relevant. It has also been found that protocols that are stable in isolation can have a lot of vulnerabilities when attacked in a group. This paper discusses ways to strengthen them against these attacks.

This study analyzes 30 protocols. It documents 163 unreported attacks possible though multiple protocols that arise through the coexistence of 23 protocols that are individually considered stable. Many of the protocols are stable individually, as well as in a two-protocol attack scenario. They break down, however, when used in a three-protocol attack.

Overall, the author does a thorough job of analyzing multiprotocol attacks. The paper also analyzes attacks and attack prevention patterns, making it a valuable resource for further research on this topic.

Reviewer:  Shantanu Bhattacharya Review #: CR134037 (0804-0375)
Bookmark and Share
  Reviewer Selected
 
 
Invasive Software (D.4.6 ... )
 
 
Cryptographic Controls (D.4.6 ... )
 
 
Reliability, Availability, And Serviceability (C.4 ... )
 
 
Security and Protection (C.2.0 ... )
 
 
General (C.2.0 )
 
 
Performance of Systems (C.4 )
 
Would you recommend this review?
yes
no
Other reviews under "Invasive Software": Date
A novel computer architecture to prevent destruction by viruses: volume management and system tuning
Qingshi G., Yue H., Lei L., Xu C., Honglan L. Journal of Computer Science and Technology 17(3): 241-248, 2002. Type: Article
Jun 25 2003
Defense and detection strategies against Internet worms
Nazario J., Artech House, Inc., Norwood, MA, 2003. Type: Book (9781580535373)
Sep 23 2004
Abstraction-based intrusion detection in distributed environments
Ning P. (ed), Jajodia S., Wang X. ACM Transactions on Information and System Security 4(4): 407-452, 2001. Type: Article
Jun 24 2002
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy