سال انتشار: ۱۳۸۴
محل انتشار: یازدهمین کنفرانس سالانه انجمن کامپیوتر ایران
تعداد صفحات: ۷
Hamid Reza Shahriari – Department of Computer Engineering Sharif University of Technology Tehran, Iran
Mohammad Sadegh Makarem, –
Marjan Sirjani –
Rasool Jalili, –
Increasing use of networks and their complexity have complicated the task of security analysis. Accordingly, automatic verification approaches have received more attention recently. In this paper, we showed how an attacker might combine simple attacks to construct a complex multiphase attack. We use Rebeca language to model the network of hosts and its model checker to find counter-examples as violation of security policies. Some simple attacks have been modeled in previous works in this area. First, we show these simple attacks in our model and then verify the model to find more complex attacks. These complex attacks may include some simpler attacks as their steps. We choose Rebeca because of its powerful yet simple actor-based paradigm in modeling concurrent and distributed systems.