Abstract
Many researchers have proposed formal frameworks for analyzing cryptographic and communication protocols and have studied the theoretical properties of the protocols, such as authenticity and secrecy. The resistance of denial-of-service attacks is one of the most important issues in network security. Several researchers have applied process calculi to security issues. One of the most remarkable of these studies is Abadi and Gordon’s, based on Milner’s pi-calculus. For the denial-of-service attack, Medow proposed a formal framework based on the Alice-and-Bob notation, and Tomioka et al. proposed a process calculus based on Milner’s pi-calculus, the Spice-calculus. Using the Spice-calculus, we can evaluate the computational cost of executing processes. In our previous works, the Spice-calculus could analyze computational costs such as arithmetic operations, hash computation, and message transmission. However, the cost of process creation was disregarded. In this paper, we improve the Spice-calculus through adding cost evaluation of process creations. We extend the syntax of the cost in the Spice-calculus and operational semantics of the Spice-calculus. We then present an example of the improved Spice-calculus.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Schuba CL, Krsul IV, Kuhn MG, Spafford EH, Sundaram A, Zamboni D (1997) Analysis of a denial of service attack on TCP. In: Proceedings of the 1997 IEEE symposium on security and privacy, pp 208–223. IEEE Computer Society, IEEE Computer Society Press
Millen JK (1993) A resource allocation model for denial of service protection. J Comput Secur 2(2/3):89–106
Meadows C (1999) A formal framework and evaluation method for network denial of service. In: Proceeding of the 12th IEEE computer security foundations workshop, pp 4–13
Meadows C (2001) A cost-based framework for analysis of denial of service networks. J Comput Secur 9(1/2):143–164
Tomioka D, Nishizaki S, Ikeda R (2004) A cost estimation calculus for analyzing the resistance to denial-of-service attack. In: Software security—theories and systems. Lecture Notes in Computer Science, vol 3233. Springer, New York, pp 25–44
Milner R, Parrow J, Walker D (1992) A culculus of mobile processes, part i and part ii. Inf Comput 100(1):1–77
Abadi M, Gordon AD (1997) A calculus for cryptographic protocols: the spi calculus. In: Fourth ACM conference on computer and communication security, pp 36–47. ACM Press, New York
Cervesato I (2006) Towards a notion of quantitative security analysis. In: Gollmann D, Massacci F, Yautsiukhin A (eds) Quality of protection: security measurements and metrics—QoP’05, pp 131–144. Springer advances in information security 23
TCP SYN Flooding and IP spoofing attacks (1996), CA-1996-21
Aura T, Nikander P (1997) Stateless connections. In: International conference on information and communications security ICICS’97. Lecture notes in computer science, vol 1334, pp 87–97. Springer, Berlin
Aura T, Nikander P, Leiwo J (2001) DOS-resistant authentication with client puzzles. In: Security protocols, 8th international workshop. Lecture notes in computer science, vol 2133, pp 170–177. Springer, Berlin
Acknowledgments
This work was supported by Grants-in-Aid for Scientific Research (C) (24500009).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nishizaki, Sy., Fujii, M., Ikeda, R. (2013). Process Calculus for Cost Analysis of Process Creation. In: Lu, W., Cai, G., Liu, W., Xing, W. (eds) Proceedings of the 2012 International Conference on Information Technology and Software Engineering. Lecture Notes in Electrical Engineering, vol 210. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34528-9_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-34528-9_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34527-2
Online ISBN: 978-3-642-34528-9
eBook Packages: EngineeringEngineering (R0)