SECURITY ANALYSIS OF TCP/IP NETWORKS An Approach to Automatic Analysis of Network Security Properties

被引:0
|
作者
Sveda, Miroslav [1 ]
Rysavy, Ondrej [1 ]
Matousek, Petr [1 ]
Rab, Jaroslav [1 ]
Cejka, Rudolf [1 ]
机构
[1] Brno Univ Technol, Fac Informat Technol, Bozetechova 2, Brno, Czech Republic
关键词
Intranet Topology; Dynamic Routing; State-based Reachability; Security; Bounded Model Checking; SAT;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper deals with an approach to security analysis of TCP/IP-based computer networks. The method developed stems from a formal model of network topology with changing link states, and deploys bounded model checking of network security properties supported by SAT-based decision procedure. Its implementation consists of a set of tools that provide automatic analysis of router configurations, network topologies, and states with respect to checked properties. While the paper aims at supporting a real practice, its form strives to be exact enough to explain the principles of the method in more detail.
引用
收藏
页码:5 / 11
页数:7
相关论文
共 50 条
  • [1] Representing TCP/IP connectivity for topological analysis of network security
    Ritchey, R
    O'Berry, B
    Noel, S
    [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 25 - 31
  • [2] Analysis of the IP Telephony Security Issues Using Automatic Neural Network Classifier
    Rezac, Filip
    Rozhon, Jan
    Safarik, Jakub
    Voznak, Miroslav
    Bajakova, Zuzana
    [J]. 2016 24TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2016, : 238 - 242
  • [3] Integration of security services into networks: Comparing TCP/IP-security and ATM-security
    Leitold, H
    [J]. ADVANCED SECURITY TECHNOLOGIES IN NETWORKING, 2001, 178 : 77 - 93
  • [4] Intelligent assessment of distributed security in TCP/IP networks
    Cardoso, RC
    Freire, MM
    [J]. HIGH SPEED NETWORKS AND MULTIMEDIA COMMUNICATIONS, PROCEEDINGS, 2004, 3079 : 1092 - 1099
  • [5] Comparative Analysis of TCP/IP Security Protocols for Use in Vehicle Communication
    Lastinec, Jan
    Hudec, Ladislav
    [J]. PROCEEDINGS OF THE 2016 17TH INTERNATIONAL CARPATHIAN CONTROL CONFERENCE (ICCC), 2016, : 429 - 433
  • [6] Networks and Network Analysis for Defence and Security
    Masys, Anthony
    [J]. 2013 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2013, : 1479 - 1480
  • [7] Security Analysis of Opportunistic Networks Using Complex Network Properties
    Mohan, Srikar
    Qu, Guangzhi
    Mili, Fatma
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2012, 2012, 7405 : 462 - 478
  • [8] Analysis of security vulnerability diagnosis in mobile IP networks
    Lee, Dong Chun
    [J]. Frontiers of High Performance Computing and Networking - ISPA 2006 Workshops, Proceedings, 2006, 4331 : 949 - 954
  • [9] A topological characterization of TCP/IP security
    Vigna, G
    [J]. FME 2003: FORMAL METHODS, PROCEEDINGS, 2003, 2805 : 914 - 940
  • [10] IP Storage Security Analysis
    Bilski, Tomasz
    [J]. COMPUTER NETWORKS, 2012, 291 : 216 - 228