User Interface for Process Calculus for DoS-attack Resistance Analysis

We proposed a process calculus for Denial-of-Service attack resistance, Spice calculus, which is an extended variation of Milner’s pi-calculus, adding a type system for cost estimation. Though we have studied theoretical aspects of the calculus, a practical application has not yet been developed. In this paper, we design and implement a user interface of reasoning in the Spice calculus. In the user interface, we harmonize both command-line and graphical interfaces. We explain the user interface, giving an example of an actual execution.

[1]  Robin Milner,et al.  Communication and concurrency , 1989, PHI Series in computer science.

[2]  Hugo Torres Vieira,et al.  SLMC: A Tool for Model Checking Concurrent Systems against Dynamical Spatial Logic Specifications , 2012, TACAS.

[3]  Jugal K. Kalita,et al.  Network defense: Approaches, methods and techniques , 2015, J. Netw. Comput. Appl..

[4]  Pierre Castéran,et al.  Interactive Theorem Proving and Program Development , 2004, Texts in Theoretical Computer Science An EATCS Series.

[5]  Shin-ya Nishizaki,et al.  Cooperation of Model Checking and Network Simulation for Cost Analyses of Distributed Systems , 2011 .

[6]  Robin Milner,et al.  A Calculus of Mobile Processes, II , 1992, Inf. Comput..

[7]  Shin-ya Nishizaki,et al.  A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack , 2003, ISSS.

[8]  Tobias Nipkow,et al.  A Proof Assistant for Higher-Order Logic , 2002 .

[9]  Shin Nakajima,et al.  The SPIN Model Checker : Primer and Reference Manual , 2004 .

[10]  Shin-ya Nishizaki,et al.  Formalization of Signaling System by Process Calculus , 2014 .

[11]  Robin Milner,et al.  A Calculus of Mobile Processes, II , 1992, Inf. Comput..

[12]  Davide Sangiorgi,et al.  The Pi-Calculus - a theory of mobile processes , 2001 .

[13]  Martín Abadi,et al.  A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.

[14]  Lawrence C. Paulson,et al.  Logic and computation - interactive proof with Cambridge LCF , 1987, Cambridge tracts in theoretical computer science.

[15]  Quoc-Tuan Vien,et al.  A Comparative Experimental Design and Performance Analysis of Snort-Based Intrusion Detection System in Practical Computer Networks , 2017, Comput..