Skip to main content

Event Calcululus Based Checking of Filtering Policies

  • Conference paper
Computer Network Security (MMM-ACNS 2007)

Abstract

The paper considers the approach to filtering policy verification. We model potential network traffic with Event Calculus and use abductive proof procedure to detect firewall filtering anomalies in dynamical way. Generally, our appraoch allows separating network behavior description from security inconsistency definition and thus building flexible and scalable framework for filtering policy verification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Al-Shaer, E., Hamed, H.: Firewall Policy Advisor for Anomaly Discovery and Rule Editing. Integrated Network Management (2003)

    Google Scholar 

  2. Al-Shaer, E., Hamed, H., Boutaba, R., Hasan, M.: Conflict classification and analysis of distributed firewall policies. IEEE Journal on Selected Areas in Communications 23(10) (2005)

    Google Scholar 

  3. Bandara, A.K., Kakas, A.S., Lupu, E.C., Russo, A.: Using Argumentation Logic for Firewall Policy Specification and Analysis. In: State, R., van der Meer, S., O’Sullivan, D., Pfeifer, T. (eds.), DSOM 2006. LNCS, vol. 4269, Springer, Heidelberg (2006)

    Google Scholar 

  4. Bandara, A.K., Lupu, E.C., Russo, A.: using Event Calculus to Formalise Policy Specification and Analysis. In: IEEE Workshop on Policies for Distributed Systems and Networks. IEEE Computer Society Press, Los Alamitos (2003)

    Google Scholar 

  5. Endriss, U., Mancarella, P. Sadri, F., Terreni, G., Toni, F.: The CIFF Proof Procedure: Definition and Soundness Results. Technical Report 2004/2, Department of Computing, Imperial College London (2004)

    Google Scholar 

  6. GORGIAS. Argumentation and Abduction, http://www2.cs.ucy.ac.cy/çnkd/gorgias/

  7. Kowalski, R.A., Sergot, M.J.: A Logic-Based Calculus of Events. New Generation Computing 4 (1986)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tishkov, A., Sidelnikova, E., Kotenko, I. (2007). Event Calcululus Based Checking of Filtering Policies. In: Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds) Computer Network Security. MMM-ACNS 2007. Communications in Computer and Information Science, vol 1. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73986-9_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73986-9_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73985-2

  • Online ISBN: 978-3-540-73986-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics