Network Threat Analysis based on Vulnerability Relation Model
نویسندگان
چکیده
منابع مشابه
Model-based Vulnerability Analysis of IMS Network
IP Multimedia Subsystem (IMS) as the core of Next Generation Network (NGN), its security is vital important. However, IMS is a network with openarchitecture based on IP, which brings a lot of security issues. There has already some research results about IMS security, but systematic and model-based research results are lacked. Based on TVRA method, this paper establishes a comprehensive vulnera...
متن کاملmortality forecasting based on lee-carter model
over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...
15 صفحه اولNetwork Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a fact, exploiting most of vulnerabilities result in access rights alteration. In this paper, we propose a new vulnerability analysis method based on the Take-Grant protection model. We extend the initial TakeGrant model...
متن کاملA Threat-Vulnerability Based Risk Analysis Model for Cyber Physical System Security
The ability to network machinery and devices that are otherwise isolated is highly attractive to industry. This has led to growth in the use of cyber-physical systems (CPSs) with existing infrastructure. However, coupling physical and cyber processes leaves CPSs vulnerable to security attacks. A threat-vulnerability based risk model is developed through a detailed analysis of CPS security attac...
متن کاملA Graph-Based Network-Vulnerability Analysis System
This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Security and Its Applications
سال: 2015
ISSN: 1738-9976,1738-9976
DOI: 10.14257/ijsia.2015.9.1.34