Abstract
The paper considers the approach to filtering policy verification. We model potential network traffic with Event Calculus and use abductive proof procedure to detect firewall filtering anomalies in dynamical way. Generally, our appraoch allows separating network behavior description from security inconsistency definition and thus building flexible and scalable framework for filtering policy verification.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Al-Shaer, E., Hamed, H.: Firewall Policy Advisor for Anomaly Discovery and Rule Editing. Integrated Network Management (2003)
Al-Shaer, E., Hamed, H., Boutaba, R., Hasan, M.: Conflict classification and analysis of distributed firewall policies. IEEE Journal on Selected Areas in Communications 23(10) (2005)
Bandara, A.K., Kakas, A.S., Lupu, E.C., Russo, A.: Using Argumentation Logic for Firewall Policy Specification and Analysis. In: State, R., van der Meer, S., O’Sullivan, D., Pfeifer, T. (eds.), DSOM 2006. LNCS, vol. 4269, Springer, Heidelberg (2006)
Bandara, A.K., Lupu, E.C., Russo, A.: using Event Calculus to Formalise Policy Specification and Analysis. In: IEEE Workshop on Policies for Distributed Systems and Networks. IEEE Computer Society Press, Los Alamitos (2003)
Endriss, U., Mancarella, P. Sadri, F., Terreni, G., Toni, F.: The CIFF Proof Procedure: Definition and Soundness Results. Technical Report 2004/2, Department of Computing, Imperial College London (2004)
GORGIAS. Argumentation and Abduction, http://www2.cs.ucy.ac.cy/çnkd/gorgias/
Kowalski, R.A., Sergot, M.J.: A Logic-Based Calculus of Events. New Generation Computing 4 (1986)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tishkov, A., Sidelnikova, E., Kotenko, I. (2007). Event Calcululus Based Checking of Filtering Policies. In: Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds) Computer Network Security. MMM-ACNS 2007. Communications in Computer and Information Science, vol 1. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73986-9_21
Download citation
DOI: https://doi.org/10.1007/978-3-540-73986-9_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73985-2
Online ISBN: 978-3-540-73986-9
eBook Packages: Computer ScienceComputer Science (R0)