Back to Search Start Over

A machine learning-based scheme for the security analysis of authentication and key agreement protocols.

Authors :
Ma, Zhuo
Liu, Yang
Wang, Zhuzhu
Ge, Haoran
Zhao, Meng
Source :
Neural Computing & Applications. Nov2020, Vol. 32 Issue 22, p16819-16831. 13p.
Publication Year :
2020

Abstract

This paper proposes a novel machine learning-based scheme for the automatic analysis of authentication and key agreement protocols. Considering the traditional formal protocol analysis schemes, their analysis accuracies depend heavily on the prior knowledge possessed by the analyst and the subjective understanding of the protocol. The rapid development of artificial intelligence in security field shows that the ideal way to get rid of the dependency is to use machine learning. Hence, we elaborately compare more than 2000 protocol analysis results and select 500 most representative ones of them to build a protocol dataset. Combining the protocol representation method of traditional schemes, these selected protocols are expressed as weight matrixes based on security components. Furthermore, a machine learning-based security analysis model is proposed to automatically find the attacks of the protocol. For now, three types of attacks against authentication and key agreement protocols can be identified based on our model. And experiment results show that it can reach almost 72% upper-bound performance. From the derivative of the accuracy curves, it can be inferred that the performance of our scheme will definitely get better as the dataset expands. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
09410643
Volume :
32
Issue :
22
Database :
Academic Search Index
Journal :
Neural Computing & Applications
Publication Type :
Academic Journal
Accession number :
146584210
Full Text :
https://doi.org/10.1007/s00521-018-3929-8