Complex system representation for vulnerability analysis
نویسندگان
چکیده
منابع مشابه
Vulnerability Analysis of High Dimensional Complex Systems
Complex systems experience dramatic changes in behavior and can undergo transitions from functional to dysfunctional states. An unstable system is prone to dysfunctional collective cascades that result from self-reinforcing behaviors within the system. Because many human and technological civilian and military systems today are complex systems, understanding their susceptibility to collective f...
متن کاملAn Ant Colony Optimization Algorithm for Network Vulnerability Analysis
Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...
متن کاملVulnerability Analysis of the Brazilian Payment System
In this paper we analyze the security of the new Brazilian Payment System. No worrying vulnerabilities were found, but there are some issues that we believe need to be addressed more carefully. Some minor changes and directions for further development of the system are proposed, such as: specifying which random number generators can be used in the system and encrypting digital signatures to avo...
متن کاملA Graph-Based Network-Vulnerability Analysis System
This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps,...
متن کاملVulnerability Analysis And Security System For NFC-Enabled Mobile Phones
An encryption system for NFC enabled applications using a combination of AES cryptography algorithm and DiffieHellman key negotiation scheme which when implemented prevents data modification, man in the middle attack and eavesdropping has been proposed in the paper. A timestamp based Protocol where the size of the file and time at which it is sent is retrieved to calculate the estimated time of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IFAC-PapersOnLine
سال: 2015
ISSN: 2405-8963
DOI: 10.1016/j.ifacol.2015.06.205