Title :
A Logic-Reasoning Approach to Network Security Analysis
Author :
HanDong Mao ; Aihua Bao ; Chen Feng ; Weiming Zhang
Author_Institution :
Nat. Univ. of Defense Technol., Changsha
Abstract :
Work in network security has focused on the fact that combinations of exploits are the typical means by which an attacker breaks into a network. Researchers have proposed a variety of graph-based analysis approach, and there is often a lack of logical formalism. This paper describes a new approach to represent and analyze network vulnerability. We propose logical exploitation graph, which directly illustrate logical dependencies among exploitation goals and network configure. Our logical exploitation graph generation tool builds upon LEG-NSA, a network security analyzer based on Prolog logical programming.
Keywords :
PROLOG; formal logic; graph theory; security of data; telecommunication security; LEG-NSA; Prolog logical programming; graph-based analysis; logic reasoning approach; logical dependencies; logical exploitation graph generation tool; network security analysis; network vulnerability; Conference management; Engines; Information analysis; Information management; Information security; Knowledge management; Logic programming; Management information systems; National security; Technology management;
Conference_Titel :
Semantics, Knowledge and Grid, Third International Conference on
Conference_Location :
Shan Xi
Print_ISBN :
0-7695-3007-9
Electronic_ISBN :
978-0-7695-3007-9
DOI :
10.1109/SKG.2007.156