MSM0021630528: Security-Oriented Research in
Information Technology, by the Grant Agency of the
Czech Republic through the grant no. GACR
102/08/1429: Safety and Security of Networked
Embedded System Applications, and by the Brno
University of Technology, Faculty of Information
Technology through the specific research grant no.
FIT-10-S-1: Secured, Reliable and Adaptive
Computer Systems. Also, the first co-author was
supported by the grant no. FR-TI1/037 of Ministry
of Industry and Trade: Automatic Attack Processing.
REFERENCES
Bartal, Y., Mayer, A.J., Nissim, K., Wool, A., 1999.
Firmato: A Novel Firewall Management Toolkit. In
IEEE Symposium on Security and Privacy, pages 17–
31.
Bera, P., Ghosh, S.K., Dasgupta, Pallab, 2009. Fault
Analysis of Security Policy Implementations in
Enterprise Networks. In the First International
Conference on Networks & Communications, IEEE
Comp.Soc., pages 240-245.
Bera, P., Ghosh, S.K., Dasgupta, Pallab, 2009a. Formal
Verification of Security Policy Implementations in
Enterprise Networks. In LNCS 5905, Springer Berlin /
Heidelberg, pages 117-131.
Biere, A., Cinnatti, A., Clarke, E., Strichman, O., Zhu, Y.,
2003. Bounded model checking. Advances in
Computers, Advances in Computers, Academic Press.
Burns, J., et al., 2001. Automatic management of network
security policy. In DARPA Information Survivability
Conference and Exposition, pages 1012–1026.
Cejka, R., Matoušek, P., Rab J., Rysavy, O., Sveda, M.,
2008. A Formal Approach to Network Security
Analysis. Technical Report FIT, Brno University of
Technology, Brno, CZ.
Christiansen, M., Fleury, E., 2004. An Interval Decision
Diagram Based Firewall. In 3rd International
Conference on Networking (ICN’04). IEEE, pages 1–
6.
Clarke, E.M., Grumberg, O., Peled, D.A., 1999. Model
Checking. MIT Press.
Gross, J.L., Yellen, J., (editors), 2004. Handbook of Graph
Theory. CRC Press.
Holloway, E.M., 2009. Self Organized Multi Agent
Swarms (SOMAS) for Network Security. Master’s
Thesis, Air Force Inst of Tech Wright-Patterson AFB
OH School of Engineering and Management.
Jeffrey, A., Samak, T., 2009. Model Checking Firewall
Policy Configurations. In IEEE International
Symposium on Policies for Distributed Systems and
Networks, pages 60-67, 2009.
Kumar, S., 1995. Classification and Detection of
Computer Intrusions. PhD Thesis, Purdue, IN.
Lindqvist, U., Jonsson, E., 1997. How to Systematically
Classify Computer Security Intrusions. In IEEE
Symposium on Security and Privacy, Washington DC.
Matousek, P., Rab, J., Rysavy, O., Sveda, M., 2008. A
formal model for network-wide security analysis. In
15th IEEE Symposium and Workshop on ECBS, 2008.
Mitre, 2008. Common Vulnerabilities and Exposures
Database. Available on
http://cve.mitre.org/; accessed on Feb 2008.
Neumann, P.G., Parker, D.B., 1989. A Summary of
Computer Misuse Techniques. In Proc. 12th National
Computer Security Conference, pages 396–407.
Ou, X., Govindavajhala, S., Appel, A.W., 2005. MulVAL:
A logic-based network security analyzer. In Proc. of
the 14th USENIX Security Symposium, Baltimore.
Ritchey, R.W., Ammann, P., 2000. Using model checking
to analyze network vulnerabilities. In IEEE
Symposium on Security and Privacy, Washington,
USA.
Shahriari, H.R., Jalili, R., 2005. Modeling and Analyzing
Network Vulnerabilities via a Logic-Based Approach.
In 2nd Int. Symposium of Telecommunications, pages
13–18.
Snort, 2008. Snort network intrusion and prevention
system. Available from http://www.snort.org/;
accessed on Feb 2008.
Stirling, C., 1992. Modal and temporal logics. pages 477–
563. Oxford University Press, Inc., New York, NY,
USA.
Tidwell, T., Larson R., Fitch K., Hale J., 2001. Modeling
Internet attacks. In Proc. of the IEEE Workshop on
Information Assurance and Security, West Point, NY.
Xie, G.G., Zhan, J., Maltz, D.A., Zhang, H., Greenberg,
A.G., Hjalmtysson, G., Rexford, J., 2005. On static
reachability analysis of ip networks. In INFOCOM,
pages 2170–2183.
Zakeri, R., Shahriari, H.R., Jalili, R., Sadoddin, R. , 2005.
Modeling TCP/IP Networks Topology for Network
Vulnerability Analysis. In 2nd Int. Symposium of
Telecommunications, pages 653–658.
SECURITY ANALYSIS OF TCP/IP NETWORKS - An Approach to Automatic Analysis of Network Security Properties
11