Security analysis of TCP/IP networks: An approach to automatic analysis of network security properties

M. Svéda, O. Ryšavý, P. Matoušek, J. Ráb, Rudolf Cejka
{"title":"Security analysis of TCP/IP networks: An approach to automatic analysis of network security properties","authors":"M. Svéda, O. Ryšavý, P. Matoušek, J. Ráb, Rudolf Cejka","doi":"10.5220/0002838300050011","DOIUrl":null,"url":null,"abstract":"This paper deals with an approach to security analysis of TCP/IP-based computer networks. The method developed stems from a formal model of network topology with changing link states, and deploys bounded model checking of network security properties supported by SAT-based decision procedure. Its implementation consists of a set of tools that provide automatic analysis of router configurations, network topologies, and states with respect to checked properties. While the paper aims at supporting a real practice, its form strives to be exact enough to explain the principles of the method in more detail.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"326-328 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Data Communication Networking (DCNET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5220/0002838300050011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

This paper deals with an approach to security analysis of TCP/IP-based computer networks. The method developed stems from a formal model of network topology with changing link states, and deploys bounded model checking of network security properties supported by SAT-based decision procedure. Its implementation consists of a set of tools that provide automatic analysis of router configurations, network topologies, and states with respect to checked properties. While the paper aims at supporting a real practice, its form strives to be exact enough to explain the principles of the method in more detail.
TCP/IP网络安全分析:一种自动分析网络安全属性的方法
本文讨论了一种基于TCP/ ip的计算机网络安全分析方法。该方法源于具有变化链路状态的网络拓扑的形式化模型,并部署基于sat的决策过程支持的网络安全属性的有界模型检查。它的实现由一组工具组成,这些工具提供了对路由器配置、网络拓扑和与已检查属性相关的状态的自动分析。虽然本文旨在支持实际实践,但其形式力求足够精确,以便更详细地解释该方法的原理。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信