Using argumentation logic for firewall configuration management.
Arosha K. BandaraAntonis C. KakasEmil C. LupuAlessandra RussoPublished in: Integrated Network Management (2009)
Keyphrases
- configuration management
- proof procedures
- network management
- argumentation theory
- defeasible reasoning
- version control
- defeasible logic
- network security
- intrusion detection
- network traffic
- modal logic
- inference rules
- logic programming
- multi valued
- classical logic
- argumentation systems
- intrusion detection system
- knowledge base
- proof procedure
- theorem proving
- data processing
- abstract argumentation frameworks
- information technology
- data mining
- packet filtering