loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Author: Mariusz Stawowski

Affiliation: Cybernetics Faculty, Military University of Technology, Poland

Keyword(s): Network Security Principles, Security Design Analysis, Graph Models and Methods, Formal Security Analysis.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Information Assurance ; Information Systems Auditing ; Planning Security

Abstract: An assessment of network security design correctness requires an analysis of many aspects, e.g. security zones correctness, access control protection layers as well as protections tightness against intrusions. Using formal methods based on graph theory in medium up to large-scale networks can greatly speed up and improve accuracy of performing security analysis. The analysis models and methods described in this document allow for quick identification of network security design errors resulted from breaking the “Compartmentalization of Information” and the “Defense-in-Depth” security principles, checking if protections used allow for security incidents handling as well as verification of many other security aspects. The analysis methods developed here can be used during network security design process and also for security assessment of existing computer information systems.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.133.147.252

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Stawowski, M. (2007). FORMAL ANALYSIS METHODS OF NETWORK SECURITY DESIGN. In Proceedings of the Second International Conference on Security and Cryptography (ICETE 2007) - SECRYPT; ISBN 978-989-8111-12-8; ISSN 2184-3236, SciTePress, pages 313-318. DOI: 10.5220/0002118903130318

@conference{secrypt07,
author={Mariusz Stawowski.},
title={FORMAL ANALYSIS METHODS OF NETWORK SECURITY DESIGN},
booktitle={Proceedings of the Second International Conference on Security and Cryptography (ICETE 2007) - SECRYPT},
year={2007},
pages={313-318},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002118903130318},
isbn={978-989-8111-12-8},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the Second International Conference on Security and Cryptography (ICETE 2007) - SECRYPT
TI - FORMAL ANALYSIS METHODS OF NETWORK SECURITY DESIGN
SN - 978-989-8111-12-8
IS - 2184-3236
AU - Stawowski, M.
PY - 2007
SP - 313
EP - 318
DO - 10.5220/0002118903130318
PB - SciTePress