Event Calcululus Based Checking of Filtering Policies

  • Artem Tishkov
  • Ekaterina Sidelnikova
  • Igor Kotenko
Part of the Communications in Computer and Information Science book series (CCIS, volume 1)


The paper considers the approach to filtering policy verification. We model potential network traffic with Event Calculus and use abductive proof procedure to detect firewall filtering anomalies in dynamical way. Generally, our appraoch allows separating network behavior description from security inconsistency definition and thus building flexible and scalable framework for filtering policy verification.


Security policy policy verification filtering Event Calculus 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Al-Shaer, E., Hamed, H.: Firewall Policy Advisor for Anomaly Discovery and Rule Editing. Integrated Network Management (2003)Google Scholar
  2. 2.
    Al-Shaer, E., Hamed, H., Boutaba, R., Hasan, M.: Conflict classification and analysis of distributed firewall policies. IEEE Journal on Selected Areas in Communications 23(10) (2005)Google Scholar
  3. 3.
    Bandara, A.K., Kakas, A.S., Lupu, E.C., Russo, A.: Using Argumentation Logic for Firewall Policy Specification and Analysis. In: State, R., van der Meer, S., O’Sullivan, D., Pfeifer, T. (eds.), DSOM 2006. LNCS, vol. 4269, Springer, Heidelberg (2006)Google Scholar
  4. 4.
    Bandara, A.K., Lupu, E.C., Russo, A.: using Event Calculus to Formalise Policy Specification and Analysis. In: IEEE Workshop on Policies for Distributed Systems and Networks. IEEE Computer Society Press, Los Alamitos (2003)Google Scholar
  5. 5.
    Endriss, U., Mancarella, P. Sadri, F., Terreni, G., Toni, F.: The CIFF Proof Procedure: Definition and Soundness Results. Technical Report 2004/2, Department of Computing, Imperial College London (2004)Google Scholar
  6. 6.
    GORGIAS. Argumentation and Abduction,çnkd/gorgias/
  7. 7.
    Kowalski, R.A., Sergot, M.J.: A Logic-Based Calculus of Events. New Generation Computing 4 (1986)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Artem Tishkov
    • 1
  • Ekaterina Sidelnikova
    • 1
  • Igor Kotenko
  1. 1.Computer Security Research GroupSt. Petersburg Institute for Informatics and AutomationSt.-PetersburgRussia

Personalised recommendations