Title :
Using Description Logics for Network Vulnerability Analysis
Author :
Zakeri, Reza ; Jalili, Rasool ; Shahriari, Hamid Reza ; Abolhassani, Hassan
Author_Institution :
Network Security Center, Sharif University of Technology
Abstract :
The distributed nature and complexity of computer networks and various services provided via them, makes the networks vulnerable to numerous attacks. The TCP/IP presumptions which are based on using this protocol to provide a simple, open communication infrastructure in an academic and collaborative environment, causes this protocol lack of built-in mechanisms for authentication, integrity and privacy. Even though in the last few years a more systematic approach to TCP/IP network security problem has been followed, a formal approach to this problem is lacking. In this paper, we propose using Description Logics as a formal model which could be used to analyze TCP/IP networks against attacks. Moreover we have presented a case study which models one of famous attack categories, i.e. Man in the Middle (MITM). This model lets automatically verify and proof network safety or vulnerability against this attack.
Keywords :
Authentication; Collaboration; Communication system security; Computer networks; IP networks; Logic; Privacy; Protocols; Safety; TCPIP;
Conference_Titel :
Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006. ICN/ICONS/MCL 2006. International Conference on
Print_ISBN :
0-7695-2552-0
DOI :
10.1109/ICNICONSMCL.2006.222