Loading...
Using description logics for network vulnerability analysis
Zakeri, R ; Sharif University of Technology | 2006
267
Viewed
- Type of Document: Article
- DOI: 10.1109/ICNICONSMCL.2006.222
- Publisher: 2006
- Abstract:
- The distributed nature and complexity of computer networks and various services provided via them, makes the networks vulnerable to numerous attacks. The TCP/IP presumptions which are based on using this protocol to provide a simple, open communication infrastructure in an academic and collaborative environment, causes this protocol lack of built-in mechanisms for authentication, integrity and privacy. Even though in the last few years a more systematic approach to TCP/IP network security problem has been followed, a formal approach to this problem is lacking. In this paper, we propose using Description Logics as a formal model which could be used to analyze TCP/IP networks against attacks. Moreover we have presented a case study which models one of famous attack categories, i.e. Man in the Middle (MTM). This model lets automatically verify and proof network safety or vulnerability against this attack. © 2006 IEEE
- Keywords:
- Authentication ; Description logics ; Network security problem ; Network vulnerability analysis ; Distributed computer systems ; Formal logic ; Mathematical models ; Network protocols ; Problem solving ; Security systems ; Telecommunication networks
- Source: International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, ICN/ICONS/MCL'06, Morne, 23 April 2006 through 29 April 2006 ; Volume 2006 , 2006 ; 0769525520 (ISBN); 9780769525525 (ISBN)
- URL: https://ieeexplore.ieee.org/document/1628324