A Formal Approach to Identifying Security Vulnerabilities in Telecommunication Networks

Inna Vistbakka, Elena Troubitsyna, Linas Laibinis, Ian Oliver, Silke Holtmanns

Research output: Chapter in Book/Conference proceedingConference contributionScientificpeer-review

2 Citations (Scopus)

Abstract

The number of security attacks on the telecommunication networks is constantly increasing. To prevent them, the telecom sector is looking for new automated techniques facilitating a discovery of potential network vulnerabilities and rectification of them. In this paper, we propose an approach for identifying potential attack scenarios and defining recommendations for preventing them. The approach is formalised in the Event-B framework. It allows us to not only formalise the analysed part of the network architecture and verify consistency of the control and data flow of the associated services but also employ model checking to generate and analyse attack scenarios. By applying the proposed approach, the designers can systematically explore network vulnerabilities and propose recommendations for attack prevention.

Original languageUndefined/Unknown
Title of host publicationFormal Methods and Software Engineering 18th International Conference on Formal Engineering Methods, ICFEM 2016, Tokyo, Japan, November 14-18, 2016, Proceedings
EditorsKazuhiro Ogata, Mark Lawford, Shaoying Liu
PublisherSpringer
Pages141–158
ISBN (Electronic)978-3-319-47846-3
ISBN (Print)978-3-319-47845-6
DOIs
Publication statusPublished - 2016
MoE publication typeA4 Article in a conference publication
EventInternational Conference on Formal Engineering Methods (ICFEM) - International Conference on Formal Engineering Methods -- ICFEM 2016
Duration: 14 Nov 201618 Nov 2016

Conference

ConferenceInternational Conference on Formal Engineering Methods (ICFEM)
Period14/11/1618/11/16

Cite this