Abstract
The number of security attacks on the telecommunication networks is constantly increasing. To prevent them, the telecom sector is looking for new automated techniques facilitating a discovery of potential network vulnerabilities and rectification of them. In this paper, we propose an approach for identifying potential attack scenarios and defining recommendations for preventing them. The approach is formalised in the Event-B framework. It allows us to not only formalise the analysed part of the network architecture and verify consistency of the control and data flow of the associated services but also employ model checking to generate and analyse attack scenarios. By applying the proposed approach, the designers can systematically explore network vulnerabilities and propose recommendations for attack prevention.
Original language | Undefined/Unknown |
---|---|
Title of host publication | Formal Methods and Software Engineering 18th International Conference on Formal Engineering Methods, ICFEM 2016, Tokyo, Japan, November 14-18, 2016, Proceedings |
Editors | Kazuhiro Ogata, Mark Lawford, Shaoying Liu |
Publisher | Springer |
Pages | 141–158 |
ISBN (Electronic) | 978-3-319-47846-3 |
ISBN (Print) | 978-3-319-47845-6 |
DOIs | |
Publication status | Published - 2016 |
MoE publication type | A4 Article in a conference publication |
Event | International Conference on Formal Engineering Methods (ICFEM) - International Conference on Formal Engineering Methods -- ICFEM 2016 Duration: 14 Nov 2016 → 18 Nov 2016 |
Conference
Conference | International Conference on Formal Engineering Methods (ICFEM) |
---|---|
Period | 14/11/16 → 18/11/16 |