Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 210))

Abstract

Many researchers have proposed formal frameworks for analyzing cryptographic and communication protocols and have studied the theoretical properties of the protocols, such as authenticity and secrecy. The resistance of denial-of-service attacks is one of the most important issues in network security. Several researchers have applied process calculi to security issues. One of the most remarkable of these studies is Abadi and Gordon’s, based on Milner’s pi-calculus. For the denial-of-service attack, Medow proposed a formal framework based on the Alice-and-Bob notation, and Tomioka et al. proposed a process calculus based on Milner’s pi-calculus, the Spice-calculus. Using the Spice-calculus, we can evaluate the computational cost of executing processes. In our previous works, the Spice-calculus could analyze computational costs such as arithmetic operations, hash computation, and message transmission. However, the cost of process creation was disregarded. In this paper, we improve the Spice-calculus through adding cost evaluation of process creations. We extend the syntax of the cost in the Spice-calculus and operational semantics of the Spice-calculus. We then present an example of the improved Spice-calculus.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Schuba CL, Krsul IV, Kuhn MG, Spafford EH, Sundaram A, Zamboni D (1997) Analysis of a denial of service attack on TCP. In: Proceedings of the 1997 IEEE symposium on security and privacy, pp 208–223. IEEE Computer Society, IEEE Computer Society Press

    Google Scholar 

  2. Millen JK (1993) A resource allocation model for denial of service protection. J Comput Secur 2(2/3):89–106

    Google Scholar 

  3. Meadows C (1999) A formal framework and evaluation method for network denial of service. In: Proceeding of the 12th IEEE computer security foundations workshop, pp 4–13

    Google Scholar 

  4. Meadows C (2001) A cost-based framework for analysis of denial of service networks. J Comput Secur 9(1/2):143–164

    Google Scholar 

  5. Tomioka D, Nishizaki S, Ikeda R (2004) A cost estimation calculus for analyzing the resistance to denial-of-service attack. In: Software security—theories and systems. Lecture Notes in Computer Science, vol 3233. Springer, New York, pp 25–44

    Google Scholar 

  6. Milner R, Parrow J, Walker D (1992) A culculus of mobile processes, part i and part ii. Inf Comput 100(1):1–77

    Article  MathSciNet  MATH  Google Scholar 

  7. Abadi M, Gordon AD (1997) A calculus for cryptographic protocols: the spi calculus. In: Fourth ACM conference on computer and communication security, pp 36–47. ACM Press, New York

    Google Scholar 

  8. Cervesato I (2006) Towards a notion of quantitative security analysis. In: Gollmann D, Massacci F, Yautsiukhin A (eds) Quality of protection: security measurements and metrics—QoP’05, pp 131–144. Springer advances in information security 23

    Google Scholar 

  9. TCP SYN Flooding and IP spoofing attacks (1996), CA-1996-21

    Google Scholar 

  10. Aura T, Nikander P (1997) Stateless connections. In: International conference on information and communications security ICICS’97. Lecture notes in computer science, vol 1334, pp 87–97. Springer, Berlin

    Google Scholar 

  11. Aura T, Nikander P, Leiwo J (2001) DOS-resistant authentication with client puzzles. In: Security protocols, 8th international workshop. Lecture notes in computer science, vol 2133, pp 170–177. Springer, Berlin

    Google Scholar 

Download references

Acknowledgments

This work was supported by Grants-in-Aid for Scientific Research (C) (24500009).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shin-ya Nishizaki .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nishizaki, Sy., Fujii, M., Ikeda, R. (2013). Process Calculus for Cost Analysis of Process Creation. In: Lu, W., Cai, G., Liu, W., Xing, W. (eds) Proceedings of the 2012 International Conference on Information Technology and Software Engineering. Lecture Notes in Electrical Engineering, vol 210. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34528-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34528-9_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34527-2

  • Online ISBN: 978-3-642-34528-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics