DocumentCode
2866513
Title
A Logic-Reasoning Approach to Network Security Analysis
Author
HanDong Mao ; Aihua Bao ; Chen Feng ; Weiming Zhang
Author_Institution
Nat. Univ. of Defense Technol., Changsha
fYear
2007
fDate
29-31 Oct. 2007
Firstpage
543
Lastpage
546
Abstract
Work in network security has focused on the fact that combinations of exploits are the typical means by which an attacker breaks into a network. Researchers have proposed a variety of graph-based analysis approach, and there is often a lack of logical formalism. This paper describes a new approach to represent and analyze network vulnerability. We propose logical exploitation graph, which directly illustrate logical dependencies among exploitation goals and network configure. Our logical exploitation graph generation tool builds upon LEG-NSA, a network security analyzer based on Prolog logical programming.
Keywords
PROLOG; formal logic; graph theory; security of data; telecommunication security; LEG-NSA; Prolog logical programming; graph-based analysis; logic reasoning approach; logical dependencies; logical exploitation graph generation tool; network security analysis; network vulnerability; Conference management; Engines; Information analysis; Information management; Information security; Knowledge management; Logic programming; Management information systems; National security; Technology management;
fLanguage
English
Publisher
ieee
Conference_Titel
Semantics, Knowledge and Grid, Third International Conference on
Conference_Location
Shan Xi
Print_ISBN
0-7695-3007-9
Electronic_ISBN
978-0-7695-3007-9
Type
conf
DOI
10.1109/SKG.2007.156
Filename
4438615
Link To Document