Detail publikace

SECURITY ANALYSIS OF TCP/IP NETWORKS -- An Approach to Automatic Analysis of Network Security Properties

Originální název

SECURITY ANALYSIS OF TCP/IP NETWORKS -- An Approach to Automatic Analysis of Network Security Properties

Anglický název

SECURITY ANALYSIS OF TCP/IP NETWORKS -- An Approach to Automatic Analysis of Network Security Properties

Jazyk

en

Originální abstrakt

This paper deals with an approach to security analysis of TCP/IP-based computer networks. The method developed stems from a formal model of network topology with changing link states, and deploys bounded model checking of network security properties supported by SAT-based decision procedure. Its implementation consists of a set of tools that provide automatic analysis of router configurations, network topologies, and states with respect to checked properties. While the paper aims at supporting a real practice, its form strives to be exact enough to explain the principles of the method in more detail.

Anglický abstrakt

This paper deals with an approach to security analysis of TCP/IP-based computer networks. The method developed stems from a formal model of network topology with changing link states, and deploys bounded model checking of network security properties supported by SAT-based decision procedure. Its implementation consists of a set of tools that provide automatic analysis of router configurations, network topologies, and states with respect to checked properties. While the paper aims at supporting a real practice, its form strives to be exact enough to explain the principles of the method in more detail.

BibTex


@inproceedings{BUT34845,
  author="Miroslav {Švéda} and Ondřej {Ryšavý} and Petr {Matoušek} and Jaroslav {Ráb} and Rudolf {Čejka}",
  title="SECURITY ANALYSIS OF TCP/IP NETWORKS -- An Approach to Automatic Analysis of Network Security Properties",
  annote="This paper deals with an approach to security analysis of TCP/IP-based computer
networks. The method developed stems from a formal model of network topology with
changing link states, and deploys bounded model checking of network security
properties supported by SAT-based decision procedure. Its implementation consists
of a set of tools that provide automatic analysis of router configurations,
network topologies, and states with respect to checked properties. While the
paper aims at supporting a real practice, its form strives to be exact enough to
explain the principles of the method in more detail.",
  address="Institute for Systems and Technologies of Information, Control and Communication",
  booktitle="Proceedings of the International Conference on Data Communication Networking ICETE-DCNET 2010",
  chapter="34845",
  edition="NEUVEDEN",
  howpublished="print",
  institution="Institute for Systems and Technologies of Information, Control and Communication",
  year="2010",
  month="july",
  pages="5--11",
  publisher="Institute for Systems and Technologies of Information, Control and Communication",
  type="conference paper"
}