Loading...

Using description logics for network vulnerability analysis

Zakeri, R ; Sharif University of Technology | 2006

267 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/ICNICONSMCL.2006.222
  3. Publisher: 2006
  4. Abstract:
  5. The distributed nature and complexity of computer networks and various services provided via them, makes the networks vulnerable to numerous attacks. The TCP/IP presumptions which are based on using this protocol to provide a simple, open communication infrastructure in an academic and collaborative environment, causes this protocol lack of built-in mechanisms for authentication, integrity and privacy. Even though in the last few years a more systematic approach to TCP/IP network security problem has been followed, a formal approach to this problem is lacking. In this paper, we propose using Description Logics as a formal model which could be used to analyze TCP/IP networks against attacks. Moreover we have presented a case study which models one of famous attack categories, i.e. Man in the Middle (MTM). This model lets automatically verify and proof network safety or vulnerability against this attack. © 2006 IEEE
  6. Keywords:
  7. Authentication ; Description logics ; Network security problem ; Network vulnerability analysis ; Distributed computer systems ; Formal logic ; Mathematical models ; Network protocols ; Problem solving ; Security systems ; Telecommunication networks
  8. Source: International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, ICN/ICONS/MCL'06, Morne, 23 April 2006 through 29 April 2006 ; Volume 2006 , 2006 ; 0769525520 (ISBN); 9780769525525 (ISBN)
  9. URL: https://ieeexplore.ieee.org/document/1628324