Skip to main content

2018 | OriginalPaper | Buchkapitel

Model-Based Testing for Network Security Protocol for E-Banking Application

verfasst von : Fadele Ayotunde Alaba, Saqib Hakak, Fawad Ali Khan, Sulaimon Hakeem Adewale, Sri Rahmawati, Tundung Subali Patma, Rajab Ritonga, Tutut Herawan

Erschienen in: Information Systems Design and Intelligent Applications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Model-based testing is one of the promising innovations to meet the difficulties required in program design testing. In model-based testing, a system under test is tried for consistency with a model that portrays the required behavior of the system. In this paper, model-based strategies are utilized for recognizing vulnerabilities as a part of system security conventions and testing for right behavior of e-banking applications in which system security conventions are actualized. The Kerberos V5 network authentication protocol is used in this research to demonstrate customers’ identity to a server (and the other way around) over an uncertain connection. Password-based encryption (PBE) algorithm is used for message exchange between client and Kerberos.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Agrawal, R., Evfimievski, A. and Srikant, R. (2003). Information sharing across private databases. In Proceedings of the ACM SIGMOD Int’l Conf. on Management of Data, San Diego, CA. Agrawal, R., Evfimievski, A. and Srikant, R. (2003). Information sharing across private databases. In Proceedings of the ACM SIGMOD Int’l Conf. on Management of Data, San Diego, CA.
2.
Zurück zum Zitat Alur, R., Courcoubetis, C. and D. Dill. (1990). Model-checking for real-time systems. Proceedings of Fifth Annual IEEE Symposium on Logic in Computer Science, pg. 414–425. Alur, R., Courcoubetis, C. and D. Dill. (1990). Model-checking for real-time systems. Proceedings of Fifth Annual IEEE Symposium on Logic in Computer Science, pg. 414–425.
3.
Zurück zum Zitat Arkin, K., Thompson K., and Weinel W. (2005). The mobile jigsaw - a collaborative learning strategy for mlearning about the environment. Presented at mlearn; Making the connections. Arkin, K., Thompson K., and Weinel W. (2005). The mobile jigsaw - a collaborative learning strategy for mlearning about the environment. Presented at mlearn; Making the connections.
4.
Zurück zum Zitat Armando A and Compagna L. (2004). A SAT-based Model Checker for Security Protocols. Lecture Notes in Computer Science, pg. 13–18. Armando A and Compagna L. (2004). A SAT-based Model Checker for Security Protocols. Lecture Notes in Computer Science, pg. 13–18.
5.
Zurück zum Zitat Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., Drielsma, P.H., Héam, P.C., Kouchnarenko, O., Mantovani, J. and Mödersheim, S., 2005, July. The AVISPA tool for the automated validation of internet security protocols and applications. In Proceedings of International Conference on Computer Aided Verification (pp. 281–285). Springer Berlin Heidelberg. Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., Drielsma, P.H., Héam, P.C., Kouchnarenko, O., Mantovani, J. and Mödersheim, S., 2005, July. The AVISPA tool for the automated validation of internet security protocols and applications. In Proceedings of International Conference on Computer Aided Verification (pp. 281–285). Springer Berlin Heidelberg.
6.
Zurück zum Zitat Basin, D., M¨odersheim, S. and Vigan`o, L.; (2005): A symbolic model checker for security protocols. International Journal of Information Security, 4(3):181–208. Basin, D., M¨odersheim, S. and Vigan`o, L.; (2005): A symbolic model checker for security protocols. International Journal of Information Security, 4(3):181–208.
7.
Zurück zum Zitat Boichut, Y, Heam, and Kouchnarenko, O. (2005). Automatic Verification of Security Protocols Using Approximations; pg. 10, Doctoral dissertation, INRIA. Boichut, Y, Heam, and Kouchnarenko, O. (2005). Automatic Verification of Security Protocols Using Approximations; pg. 10, Doctoral dissertation, INRIA.
8.
Zurück zum Zitat Viganò, L., 2006. Automated security protocol analysis with the AVISPA tool. Electronic Notes in Theoretical Computer Science, 155, pp. 61–86. Viganò, L., 2006. Automated security protocol analysis with the AVISPA tool. Electronic Notes in Theoretical Computer Science, 155, pp. 61–86.
9.
Zurück zum Zitat Boreale, M., Nicolas, D and Pugliese, R., (2002). Proof techniques for cryptographic processes. In Proceedings of 14 th IEEE symposium on logic in computer science, Pg. 157–166. Boreale, M., Nicolas, D and Pugliese, R., (2002). Proof techniques for cryptographic processes. In Proceedings of 14 th IEEE symposium on logic in computer science, Pg. 157–166.
10.
Zurück zum Zitat Castellani, G.C., Quinlan, E.M., Bersani, F., Cooper, L.N. and Shouval, H.Z., 2005. A model of bidirectional synaptic plasticity: from signaling network to channel conductance. Learning & Memory, 12(4), pp. 423–432. Castellani, G.C., Quinlan, E.M., Bersani, F., Cooper, L.N. and Shouval, H.Z., 2005. A model of bidirectional synaptic plasticity: from signaling network to channel conductance. Learning & Memory, 12(4), pp. 423–432.
11.
Zurück zum Zitat El-Far, I. K and James A. Whittaker, (2001): Model-based Software Testing, Florida Institute of Technology, Melbourne, Florida, U.S.A. El-Far, I. K and James A. Whittaker, (2001): Model-based Software Testing, Florida Institute of Technology, Melbourne, Florida, U.S.A.
14.
Zurück zum Zitat Ermentrout, B., Wang, J.W., Flores, J. and Gelperin, A., 2004. Model for transition from waves to synchrony in the olfactory lobe of Limax. Journal of computational neuroscience, 17(3), pp. 365–383. Ermentrout, B., Wang, J.W., Flores, J. and Gelperin, A., 2004. Model for transition from waves to synchrony in the olfactory lobe of Limax. Journal of computational neuroscience, 17(3), pp. 365–383.
15.
Zurück zum Zitat Heckel, R. and Mariani, L., 2005, April. Automatic conformance testing of web services. In International Conference on Fundamental Approaches to Software Engineering (pp. 34–48). Springer Berlin Heidelberg. Heckel, R. and Mariani, L., 2005, April. Automatic conformance testing of web services. In International Conference on Fundamental Approaches to Software Engineering (pp. 34–48). Springer Berlin Heidelberg.
16.
Zurück zum Zitat Confora, G., Penta, M.D., Esposio, R., (2009). A brief survey of software architecture concepts and service oriented architecture. In Proceedings of International Conference on Computer Science and Technology, pg. 34–38, IEEE Press. Confora, G., Penta, M.D., Esposio, R., (2009). A brief survey of software architecture concepts and service oriented architecture. In Proceedings of International Conference on Computer Science and Technology, pg. 34–38, IEEE Press.
17.
Zurück zum Zitat Martin, B., Mitrovic, A. and Suraweera, P. (2006): ITS domain modeling with ontology. Journal of Universal Computer Science, 14(17): pg. 2758–2776. Martin, B., Mitrovic, A. and Suraweera, P. (2006): ITS domain modeling with ontology. Journal of Universal Computer Science, 14(17): pg. 2758–2776.
18.
Zurück zum Zitat Martin, B.I. (2007): An Authoring System for Constraint-Based ITSs. Chicago, IL, USA: American Educational Research Association (AERA) Annual Meeting, pg. 102–106. Martin, B.I. (2007): An Authoring System for Constraint-Based ITSs. Chicago, IL, USA: American Educational Research Association (AERA) Annual Meeting, pg. 102–106.
19.
Zurück zum Zitat Kamala, K. (2012). Security Management for GSM Networks using Kerberos v5. SRM Institute of Science and Technology, Deemed University, 23–32. Kamala, K. (2012). Security Management for GSM Networks using Kerberos v5. SRM Institute of Science and Technology, Deemed University, 23–32.
20.
Zurück zum Zitat Utting, M., Pretschner, A. and Legeard, B., 2012. A taxonomy of model-based testing approaches. Software Testing, Verification and Reliability, 22(5), pp. 297–312. Utting, M., Pretschner, A. and Legeard, B., 2012. A taxonomy of model-based testing approaches. Software Testing, Verification and Reliability, 22(5), pp. 297–312.
22.
Zurück zum Zitat Brügger, L.A., 2012. A framework for modelling and testing of security policies (Doctoral dissertation, ETH ZURICH). Brügger, L.A., 2012. A framework for modelling and testing of security policies (Doctoral dissertation, ETH ZURICH).
23.
Zurück zum Zitat Clark, E.M., Grumberg, O. and Long, D.E. (2008). Model checking and abstraction. ACM Transactions on Programming Languages and Systems (TOPLAS), 16(5):1512–1542. Clark, E.M., Grumberg, O. and Long, D.E. (2008). Model checking and abstraction. ACM Transactions on Programming Languages and Systems (TOPLAS), 16(5):1512–1542.
24.
Zurück zum Zitat Holzmann, G.J., 1997. The model checker SPIN. IEEE Transactions on software engineering, 23(5), pp. 279–295. Holzmann, G.J., 1997. The model checker SPIN. IEEE Transactions on software engineering, 23(5), pp. 279–295.
25.
Zurück zum Zitat Kennedy-Clark, S., and Thompson, K. (2012). Methods of analysis for identifying patterns of problem solving processes in a computer-supported collaborative environment. In Proceedings of the 10th International Conference of the Learning Sciences (ICLS), pg. 14–18, IEEE Press. Kennedy-Clark, S., and Thompson, K. (2012). Methods of analysis for identifying patterns of problem solving processes in a computer-supported collaborative environment. In Proceedings of the 10th International Conference of the Learning Sciences (ICLS), pg. 14–18, IEEE Press.
26.
Zurück zum Zitat Chevillat, C., Carrington, D., Strooper, P., Süß, J.G. and Wildman, L., 2008. Model-based generation of interlocking controller software from control tables. In European Conference on Model Driven Architecture-Foundations and Applications (pp. 349–360). Springer Berlin Heidelberg. Chevillat, C., Carrington, D., Strooper, P., Süß, J.G. and Wildman, L., 2008. Model-based generation of interlocking controller software from control tables. In European Conference on Model Driven Architecture-Foundations and Applications (pp. 349–360). Springer Berlin Heidelberg.
27.
Zurück zum Zitat Steiner, J.G., Neuman, B.C. and Schiller, J.I., 1988, February. Kerberos: An Authentication Service for Open Network Systems. In Usenix Winter (pp. 191–202). Steiner, J.G., Neuman, B.C. and Schiller, J.I., 1988, February. Kerberos: An Authentication Service for Open Network Systems. In Usenix Winter (pp. 191–202).
28.
Zurück zum Zitat Thompson, K., and Kelly, N. (2012). Combining collaboration spaces: Identifying patterns of tool use for decision-making in a networked learning environment. In Proceedings of the Eighth International Conference on Networked Learning, pg. 5–9. Thompson, K., and Kelly, N. (2012). Combining collaboration spaces: Identifying patterns of tool use for decision-making in a networked learning environment. In Proceedings of the Eighth International Conference on Networked Learning, pg. 5–9.
29.
Zurück zum Zitat Terpstra, R., Pires, L.F., Heerink, L. and Tretmans. J. (2009). Testing theory in practice: A simple experiment. COST, 247(6):168–183. Terpstra, R., Pires, L.F., Heerink, L. and Tretmans. J. (2009). Testing theory in practice: A simple experiment. COST, 247(6):168–183.
30.
Zurück zum Zitat Turpe, S., (2012). Point-and-shoot security design: can we build better tools for developers? Proceedings of the 2012 workshop on new security paradigms, ACM, 27–42. Turpe, S., (2012). Point-and-shoot security design: can we build better tools for developers? Proceedings of the 2012 workshop on new security paradigms, ACM, 27–42.
Metadaten
Titel
Model-Based Testing for Network Security Protocol for E-Banking Application
verfasst von
Fadele Ayotunde Alaba
Saqib Hakak
Fawad Ali Khan
Sulaimon Hakeem Adewale
Sri Rahmawati
Tundung Subali Patma
Rajab Ritonga
Tutut Herawan
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7512-4_73