Cascade Vulnerability Problem Simulator Tool
نویسندگان
چکیده
In this paper, we present a tool called the CVP Simulator Tool, which enables users to model a computer network and its connectivity, and detects and eliminates any existing Cascade Vulnerability Problems (CVP). Users can add computers into a network, define what kind of information the computer can hold (e.g., Top Secret, Classified), establish connections between computers, assign a value to this connection, and simulate information flow between computers. The presented tool integrates the best features of two programming languages, object oriented and logic programming, to express solutions in terms of constraints using Constraint Programming (CP), which is a paradigm that has been successfully applied to large scale problems such as combinatorial search, optimization, and scheduling.
منابع مشابه
The Cascade Vulnerability Problem: the detection problem and a simulated annealing approach for its correction
The Cascade Vulnerability Problem is a potential problem which must be faced when using the interconnected accredited system approach of the Trusted Network Interpretation. It belongs to a subset of the problem set that addresses the issue of whether the interconnection of secure systems via a secure channel results in a secure distributed system. The Cascade Vulnerability problem appears when ...
متن کاملImproving Bandwidth-power Efficiency of Homogeneous Wireless Networks Using On-meet Threshold Strategy (RESEARCH NOTE)
Over two decades, a problem of location dependent has been focused for improving the communication Bandwidth-Power Efficiency of homogeneous networks. The efficiencies of communication links are weakened by the Hidden Terminal Problem. Thus we propose a Fine – Tune Strategy for analyzing the On-Off communication region. We were observed that the proposed technique had been able to track and mo...
متن کاملImplementing Mitogen Activated Protein Kinases Cascade on Membrane Computing Using P-Lingua
Corresponding Author: Bareq Shaalan, Center of Software Technology and Management Faculty of Information Science and Technology, University Kebangsaan Malaysia, 43000 Bangi, Selangor, Malaysia Email: [email protected] Abstract: The Mitogen Activated Protein Kinases (MAPK) cascade has been used as a case study for different computational software tools in both modelling and simulation of real-lif...
متن کاملInterdiction problem as a tool to identify an effective budget allocation to quality improvement plans
In the face of budgetary limitations in organizations, identifying critical facilities for investing in quality improvement plans could be a sensible approach. In this paper, hierarchical facilities with specified covering radius are considered. If disruption happens to a facility, its covering radius will be decreased. For this problem, a bi-objective mathematical formulation is proposed. Crit...
متن کاملA PC-Based Logic Simulator Using a Look-Up Table Cascade Emulator
This paper represents a cycle-based logic simulation method using an LUT cascade emulator, where an LUT cascade consists of multiple-output LUTs (cells) connected in series. The LUT cascade emulator is an architecture that emulates LUT cascades. It has a control part, a memory for logic, and registers. It connects the memory to registers through a programmable interconnection circuit, and evalu...
متن کامل