
 
MSM0021630528:  Security-Oriented Research in 
Information Technology, by the Grant Agency of the 
Czech Republic through the grant no. GACR 
102/08/1429:  Safety and Security of Networked 
Embedded System Applications, and by the Brno 
University of Technology, Faculty of Information 
Technology through the specific research grant no. 
FIT-10-S-1:  Secured, Reliable and Adaptive 
Computer Systems. Also, the first co-author was 
supported by the grant no. FR-TI1/037 of Ministry 
of Industry and Trade: Automatic Attack Processing. 
REFERENCES 
Bartal, Y., Mayer, A.J., Nissim, K., Wool, A., 1999. 
Firmato: A Novel Firewall Management Toolkit. In 
IEEE Symposium on Security and Privacy, pages 17–
31.  
Bera, P., Ghosh, S.K., Dasgupta, Pallab, 2009. Fault 
Analysis of Security Policy Implementations in 
Enterprise Networks. In the First International 
Conference on Networks & Communications, IEEE 
Comp.Soc., pages 240-245. 
Bera, P., Ghosh, S.K., Dasgupta, Pallab, 2009a. Formal 
Verification of Security Policy Implementations in 
Enterprise Networks. In LNCS 5905, Springer Berlin / 
Heidelberg, pages 117-131. 
Biere, A., Cinnatti, A., Clarke, E., Strichman, O., Zhu, Y., 
2003.  Bounded model checking.  Advances in 
Computers, Advances in Computers, Academic Press.   
Burns, J., et al., 2001. Automatic management of network 
security policy. In DARPA Information Survivability 
Conference and Exposition, pages 1012–1026.  
Cejka, R., Matoušek, P., Rab J., Rysavy, O., Sveda, M., 
2008.  A Formal Approach to Network Security 
Analysis. Technical Report FIT, Brno University of 
Technology, Brno, CZ. 
Christiansen, M., Fleury, E., 2004. An Interval Decision 
Diagram Based Firewall. In 3rd International 
Conference on Networking (ICN’04). IEEE, pages 1–
6.  
Clarke, E.M., Grumberg, O., Peled, D.A., 1999. Model 
Checking. MIT Press.  
Gross, J.L., Yellen, J., (editors), 2004. Handbook of Graph 
Theory. CRC Press. 
Holloway, E.M., 2009. Self Organized Multi Agent 
Swarms (SOMAS) for Network Security. Master’s 
Thesis, Air Force Inst of Tech Wright-Patterson AFB 
OH School of Engineering and Management. 
Jeffrey, A., Samak, T., 2009. Model Checking Firewall 
Policy Configurations. In IEEE International 
Symposium on Policies for Distributed Systems and 
Networks, pages 60-67, 2009. 
Kumar, S., 1995. Classification and Detection of 
Computer Intrusions. PhD Thesis, Purdue, IN.  
Lindqvist, U., Jonsson, E., 1997. How to Systematically 
Classify Computer Security Intrusions. In IEEE 
Symposium on Security and Privacy, Washington DC.  
Matousek, P., Rab, J., Rysavy, O., Sveda, M., 2008. A 
formal model for network-wide security analysis. In 
15th IEEE Symposium and Workshop on ECBS, 2008.  
Mitre, 2008. Common Vulnerabilities and Exposures 
Database. Available on  
http://cve.mitre.org/; accessed on Feb 2008.  
Neumann, P.G., Parker, D.B., 1989. A Summary of 
Computer Misuse Techniques. In Proc. 12th National 
Computer Security Conference, pages 396–407.  
Ou, X., Govindavajhala, S., Appel, A.W., 2005. MulVAL: 
A logic-based network security analyzer. In Proc. of 
the 14th USENIX Security Symposium, Baltimore.  
Ritchey, R.W., Ammann, P., 2000. Using model checking 
to analyze network vulnerabilities. In IEEE 
Symposium on Security and Privacy, Washington, 
USA.  
Shahriari, H.R., Jalili, R., 2005. Modeling and Analyzing 
Network Vulnerabilities via a Logic-Based Approach. 
In  2nd Int. Symposium of Telecommunications, pages 
13–18.  
Snort, 2008. Snort network intrusion and prevention 
system. Available from http://www.snort.org/; 
accessed on Feb 2008. 
Stirling, C., 1992. Modal and temporal logics. pages 477–
563. Oxford University Press, Inc., New York, NY, 
USA.  
Tidwell, T., Larson R., Fitch K., Hale J., 2001. Modeling 
Internet attacks. In Proc. of the IEEE Workshop on 
Information Assurance and Security, West Point, NY.  
Xie, G.G., Zhan, J., Maltz, D.A., Zhang, H., Greenberg, 
A.G., Hjalmtysson, G., Rexford, J., 2005. On static 
reachability analysis of ip networks. In INFOCOM, 
pages 2170–2183.  
Zakeri, R., Shahriari, H.R., Jalili, R., Sadoddin, R. , 2005. 
Modeling TCP/IP Networks Topology for Network 
Vulnerability Analysis. In 2nd Int. Symposium of 
Telecommunications, pages 653–658. 
SECURITY ANALYSIS OF TCP/IP NETWORKS - An Approach to Automatic Analysis of Network Security Properties
11