• DocumentCode
    2866513
  • Title

    A Logic-Reasoning Approach to Network Security Analysis

  • Author

    HanDong Mao ; Aihua Bao ; Chen Feng ; Weiming Zhang

  • Author_Institution
    Nat. Univ. of Defense Technol., Changsha
  • fYear
    2007
  • fDate
    29-31 Oct. 2007
  • Firstpage
    543
  • Lastpage
    546
  • Abstract
    Work in network security has focused on the fact that combinations of exploits are the typical means by which an attacker breaks into a network. Researchers have proposed a variety of graph-based analysis approach, and there is often a lack of logical formalism. This paper describes a new approach to represent and analyze network vulnerability. We propose logical exploitation graph, which directly illustrate logical dependencies among exploitation goals and network configure. Our logical exploitation graph generation tool builds upon LEG-NSA, a network security analyzer based on Prolog logical programming.
  • Keywords
    PROLOG; formal logic; graph theory; security of data; telecommunication security; LEG-NSA; Prolog logical programming; graph-based analysis; logic reasoning approach; logical dependencies; logical exploitation graph generation tool; network security analysis; network vulnerability; Conference management; Engines; Information analysis; Information management; Information security; Knowledge management; Logic programming; Management information systems; National security; Technology management;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Semantics, Knowledge and Grid, Third International Conference on
  • Conference_Location
    Shan Xi
  • Print_ISBN
    0-7695-3007-9
  • Electronic_ISBN
    978-0-7695-3007-9
  • Type

    conf

  • DOI
    10.1109/SKG.2007.156
  • Filename
    4438615