Chapter

AI 2005: Advances in Artificial Intelligence

Volume 3809 of the series Lecture Notes in Computer Science pp 245-253

Analyzing Security Protocols Using Association Rule Mining

  • Qingfeng ChenAffiliated withSchool of Information Technology, Deakin University
  • , Yi-Ping Phoebe ChenAffiliated withSchool of Information Technology, Deakin University

* Final gross prices may vary according to local VAT.

Get Access

Abstract

Current studies to analyzing security protocols using formal methods require users to predefine authentication goals. Besides, they are unable to discover potential correlations between secure messages. This research attempts to analyze security protocols using data mining. This is done by extending the idea of association rule mining and converting the verification of protocols into computing the frequency and confidence of inconsistent secure messages. It provides a novel and efficient way to analyze security protocols and find out potential correlations between secure messages. The conducted experiments demonstrate our approaches.