DocumentCode :
2866513
Title :
A Logic-Reasoning Approach to Network Security Analysis
Author :
HanDong Mao ; Aihua Bao ; Chen Feng ; Weiming Zhang
Author_Institution :
Nat. Univ. of Defense Technol., Changsha
fYear :
2007
fDate :
29-31 Oct. 2007
Firstpage :
543
Lastpage :
546
Abstract :
Work in network security has focused on the fact that combinations of exploits are the typical means by which an attacker breaks into a network. Researchers have proposed a variety of graph-based analysis approach, and there is often a lack of logical formalism. This paper describes a new approach to represent and analyze network vulnerability. We propose logical exploitation graph, which directly illustrate logical dependencies among exploitation goals and network configure. Our logical exploitation graph generation tool builds upon LEG-NSA, a network security analyzer based on Prolog logical programming.
Keywords :
PROLOG; formal logic; graph theory; security of data; telecommunication security; LEG-NSA; Prolog logical programming; graph-based analysis; logic reasoning approach; logical dependencies; logical exploitation graph generation tool; network security analysis; network vulnerability; Conference management; Engines; Information analysis; Information management; Information security; Knowledge management; Logic programming; Management information systems; National security; Technology management;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Semantics, Knowledge and Grid, Third International Conference on
Conference_Location :
Shan Xi
Print_ISBN :
0-7695-3007-9
Electronic_ISBN :
978-0-7695-3007-9
Type :
conf
DOI :
10.1109/SKG.2007.156
Filename :
4438615
Link To Document :
بازگشت