Research on Network Defense Graph Model in Network Security

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Research on Network Defense Graph Model in Network Security

Security analysis and attack-defense modeling are effective method to identify the vulnerabilities of information systems for proactive defense. The attack graph model reflects only attack actions and system state changes, without considering the perspective of the defenders. To assess the network information system and comprehensively show attack and defense strategies and theirs cost, a defen...

متن کامل

Research on Context Aware Network Security Model

According to high development of internet and mobile internet technologies, more and more services and applications are researched and are becoming more and more important in people’s life. At the same time, there are still many risks that virus attack from internet. Network security is facing more challenges than before, such as attack method becoming more diversify, attack times are increasin...

متن کامل

Towards a Cooperative Defense Model Against Network Security Attacks

It is widely acknowledged that internet security issues can be handled better through cooperation rather than competition. We introduce a game theoretic cooperative model against network security attacks, where users form coalitions and invest in joint protection. We analyze coalition formation in three canonical security games described in a previous work by Grossklags et al. Our findings reve...

متن کامل

Model-driven, Moving-Target Defense for Enterprise Network Security

This chapter presents the design and initial simulation results for a prototype moving-target defense (MTD) system, whose goal is to significantly increase the difficulty of attacks on enterprise networks. Most networks are static, which gives attacker’s a great advantage. Services are run on well-known ports at fixed, easily identifiable IP addresses. The goal of an MTD system is to eliminate ...

متن کامل

Graph Theory Applications in Network Security

Graph theory has become a very critical component in many applications in the computing field including networking and security. Unfortunately, it is also amongst the most complex topics to understand and apply. In this paper, we review some of the key applications of graph theory in network security. We first cover some algorithmic aspects, then present network coding and its relation to routing.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Security and Its Applications

سال: 2016

ISSN: 1738-9976,1738-9976

DOI: 10.14257/ijsia.2016.10.11.03