Analyzing Security Protocols Using Association Rule Mining

  • Qingfeng Chen
  • Yi-Ping Phoebe Chen
Conference paper

DOI: 10.1007/11589990_27

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3809)
Cite this paper as:
Chen Q., Chen YP.P. (2005) Analyzing Security Protocols Using Association Rule Mining. In: Zhang S., Jarvis R. (eds) AI 2005: Advances in Artificial Intelligence. AI 2005. Lecture Notes in Computer Science, vol 3809. Springer, Berlin, Heidelberg

Abstract

Current studies to analyzing security protocols using formal methods require users to predefine authentication goals. Besides, they are unable to discover potential correlations between secure messages. This research attempts to analyze security protocols using data mining. This is done by extending the idea of association rule mining and converting the verification of protocols into computing the frequency and confidence of inconsistent secure messages. It provides a novel and efficient way to analyze security protocols and find out potential correlations between secure messages. The conducted experiments demonstrate our approaches.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Qingfeng Chen
    • 1
  • Yi-Ping Phoebe Chen
    • 1
  1. 1.School of Information TechnologyDeakin UniversityMelbourneAustralia

Personalised recommendations