Tools for Finding Inconsistencies in Real-world Logic-based Systems

Kevin McAreavey, Weiru Liu, Paul Miller, Chris Meenan

Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

5 Citations (Scopus)
138 Downloads (Pure)

Abstract

Currently there is extensive theoretical work on inconsistencies in logic-based systems. Recently, algorithms for identifying inconsistent clauses in a single conjunctive formula have demonstrated that practical application of this work is possible. However, these algorithms have not been extended for full knowledge base systems and have not been applied to real-world knowledge. To address these issues, we propose a new algorithm for finding the inconsistencies in a knowledge base using existing algorithms for finding inconsistent clauses in a formula. An implementation of this algorithm is then presented as an automated tool for finding inconsistencies in a knowledge base and measuring the inconsistency of formulae. Finally, we look at a case study of a network security rule set for exploit detection (QRadar) and suggest how these automated tools can be applied.
Original languageEnglish
Title of host publicationSTAIRS 2012. Frontiers in Artificial Intelligence and Applications
EditorsKristian Kersting, Marc Toussaint
PublisherIOS Press
Pages192-203
Number of pages12
Volume241
ISBN (Electronic)9781614990963
ISBN (Print)9781614990956
DOIs
Publication statusPublished - 2012
EventThe Sixth European Starting AI Researchers' Symposium (STAIRS 2012) - France, Montpellier, France
Duration: 27 Aug 201228 Aug 2012

Publication series

NameFrontiers in Artificial Intelligence and Applications
Volume241

Conference

ConferenceThe Sixth European Starting AI Researchers' Symposium (STAIRS 2012)
CountryFrance
CityMontpellier
Period27/08/201228/08/2012

Keywords

  • mises
  • inconsistency measure
  • muses
  • network security

ASJC Scopus subject areas

  • Artificial Intelligence

Fingerprint

Dive into the research topics of 'Tools for Finding Inconsistencies in Real-world Logic-based Systems'. Together they form a unique fingerprint.

Cite this