253,587 Hits in 5.4 sec

On Modeling Computer Networks for Vulnerability Analysis [chapter]

C. Campbell, J. Dawkins, B. Pollet, K. Fitch, J. Hale, M. Papa
2003 IFIP Advances in Information and Communication Technology  
The goal of network modeling for vulnerability analysis is to glean and interpret data from a variety of resources in order to create an abstract model of the security of a network.  ...  A sound network model is essential to the analysis of potential threats to a network.  ...  Network modeling provides the foundation for a vulnerability analysis system capable of identifying and predicting attack scenarios based on a holistic view of the network.  ... 
doi:10.1007/978-0-387-35697-6_18 fatcat:zbhq7bzo6jfkjgusvkefj4mll4

Modelling and Analysing Network Security Policies in a Given Vulnerability Setting [chapter]

Roland Rieke
2006 Lecture Notes in Computer Science  
This paper presents an integrated framework for model-based symbolic interpretation, simulation and analysis with a comprehensive approach focussing on the validation of network security policies.  ...  A graph of all possible attack paths is automatically computed from the model of an ICT network, of vulnerabilities, exploits and an attacker strategy.  ...  Major focus of the combined modelling framework presented in this paper, is the integration of formal network vulnerability modelling on the one hand and network security policy modelling on the other  ... 
doi:10.1007/11962977_6 fatcat:fij2wsv5anapdcwb4kum2cq4dy

Fast Network Attack Modeling and Security Evaluation based on Attack Graphs

Igor Kotenko, Andrey Chechulin
2014 Journal of Cyber Security and Mobility  
It is based on modeling of computer network and malefactors' behaviors, building attack graphs, processing current alerts for real-time adjusting of particular attack graphs, calculating different security  ...  The novelty of the proposed approach is the use of special algorithms for construction, modification and analysis of attack graphs aimed at rapid security evaluation.  ...  This research is being supported by the grants of the Russian Foundation of Basic Research (13-01-00843, 13-07-13159, 14-07-00697, 14-07-00417), the Program of fundamental research of the Department for  ... 
doi:10.13052/jcsm2245-1439.312 fatcat:5rjjqpqapvhnzpidynjlmigq4i

An Improved Model for Analysis of Host Network Vulnerability

Ramchandra Yadav, Raghu Nath, Anil Kumar
2016 International Journal of Computer Applications  
Network security depends on most of network configuration and vulnerabilities. Each machines overall susceptibility to attack depends upon the vulnerabilities of another machine.  ...  An attacker tries to exploit the least secure system by small attacks iteratively, where each exploit in the network provide the platform for subsequent exploit.  ...  CONCLUSION In this paper, we reviewed some of the existing architecture and their perspective for analyzing the vulnerability of computer network.  ... 
doi:10.5120/ijca2016911216 fatcat:4chi74tfurhqjbmpylpsd47s3y

Attack Graph Based Evaluation of Network Security [chapter]

Igor Kotenko, Mikhail Stepashkin
2006 Lecture Notes in Computer Science  
The approach is intended for using both at design and exploitation stages of computer networks.  ...  The implemented software system is described, and the examples of experiments for analysis of network security level are considered.  ...  The research is supported by grant of Russian Foundation of Basic Research (№ 04-01-00167), Department for Informational Technologies and Computation Systems of the Russian Academy of Sciences (contract  ... 
doi:10.1007/11909033_20 fatcat:4xp6duhid5ewna4rljm5pau3g4

Measurement of Security Dangers in University Network

Umesh Kumar, Chanchala Joshi, Neha Gaud
2016 International Journal of Computer Applications  
, college and university computing environments are often large open networks.  ...  Today's universities are on the forefront of technological advancement which makes University's computing environment particularly vulnerable because in contrast to hacking targets like banks and others  ...  The authors are highly thankful to Madhya Pradesh Council of Science and Technology, Bhopal for providing financial grant and support for this research project.  ... 
doi:10.5120/ijca2016911584 fatcat:z4hry37rmnfg7cjr5dfkggbzku

Generation and Analysis of Attack Graphs

Chunying Wang, Ning Du, Huijing Yang
2012 Procedia Engineering  
We implemented our technique in a tool suite and tested it on a small network example, which includes models of a firewall and an intrusion detection system.  ...  An integral part of modeling the global view of network security is constructing attack graphs.  ...  between hosts. a typical process for vulnerability analysis of a network proceeds as follows.  ... 
doi:10.1016/j.proeng.2012.01.618 fatcat:i4obveiyxvh25g54llc35za4mu

Scalable security analysis in hierarchical attack representation model using centrality measures

Jin B. Hong, Dong Seong Kim
2013 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)  
Further, countermeasures can be enforced to minimise cyber attacks based on security analysis. However, modern networked systems are becoming large sized and dynamic (e.g., Cloud Computing systems).  ...  As a result, existing security models suffer from scalability problem, where it becomes infeasible to use them for modern networked systems that contain hundreds and thousands of hosts and vulnerabilities  ...  The complexity analysis focuses on the number of hosts and vulnerabilities, as they are the major scaling factors for security models in the networked system.  ... 
doi:10.1109/dsnw.2013.6615507 dblp:conf/dsn/HongK13 fatcat:mazjgf7szja4pmd2w4c45ygxy4

Topological Vulnerability Analysis [chapter]

Sushil Jajodia, Steven Noel
2009 Advances in Information Security  
From models of the network vulnerabilities and potential attacker exploits, we compute attack graphs that convey the impact of individual and combined vulnerabilities on overall security.  ...  Traditionally, network administrators rely on labor-intensive processes for tracking network configurations and vulnerabilities.  ...  Fig. 1 1 Topological Vulnerability Analysis (TVA). Data from network scans and known vulnerabilities are combined into a model of the network security environment.  ... 
doi:10.1007/978-1-4419-0140-8_7 fatcat:qcmlgr3xqbgoljfvygzlsakw2u

Evaluation of computer network security using attack undirected geography

Chanintorn Jittawiriyanukoon
2019 Indonesian Journal of Electrical Engineering and Computer Science  
Network security model based on attack undirected geography (AUG) is familiarized. First, analysis based upon association rules is presented then the attack threshold value is set from AUG.  ...  The analytics of geography algorithms and metrics to curate insight from a security problem are a critical method of analysis for computer systems.  ...  Then in order to determine vulnerabilities in the computer network as such and simplify the representation of a target system, an attack geography corresponding to a target network for analysis and response  ... 
doi:10.11591/ijeecs.v16.i3.pp1508-1514 fatcat:6wz5fr6w25c7terevnsl3trity

The key technology of computer network vulnerability assessment based on neural network

Shaoqiang Wang
2020 EURASIP Journal on Wireless Communications and Networking  
and use of computer network vulnerability assessment as the computer simulation and analysis on the actual example designs a set of computer network vulnerability assessment scheme, finally the vulnerability  ...  The main reason why all kinds of attacks on the network can pose a great threat to the network security is the vulnerability of the computer network system itself.  ...  Acknowledgements The authors thank the editor and anonymous reviewers for their helpful comments and valuable suggestions.  ... 
doi:10.1186/s13638-020-01841-y fatcat:ow4vqywshbexto2gkcfks6bhmi

Computer Network Vulnerability Assessment and Safety Evaluation Application based on Bayesian Theory

Xianyou Zhu
2016 International Journal of Security and Its Applications  
Computer network vulnerability analysis is a method of analysis and evaluation of network security beforehand.  ...  Therefore, vulnerability analysis computer network is very important.  ...  On the basis of Bayesian attribute attack graph, the calculated probability of success of each attack path for vulnerability assessment of the network.  ... 
doi:10.14257/ijsia.2016.10.12.29 fatcat:5qev7zemdfaarhef4g7u3htrpe

Performance Analysis of Scalable Attack Representation Models [chapter]

Jin B. Hong, Dong Seong Kim
2013 IFIP Advances in Information and Communication Technology  
The main representation is simplified AG for both the upper and the lower layer. The analysis on the computational cost was given as O(n 2 ), where n is the number of hosts in the network.  ...  The analysis is focused on answering the key questions, and identifying key features of each attack model.  ... 
doi:10.1007/978-3-642-39218-4_25 fatcat:n25shpxa2zbq5fjnxz3ubudvpq

Probabilistic Performance Analysis of Moving Target and Deception Reconnaissance Defenses

Michael Crouse, Bryan Prosser, Errin W. Fulp
2015 Proceedings of the Second ACM Workshop on Moving Target Defense - MTD '15  
is for foothold only -No penalty for multiples contacts of the same vulnerable computer  ...  is a more difficult goal for the attacker • Class-C network with 25% vulnerable computers and 5% honeypots • Achieving the min-to-win can be increasingly difficult for the attacker -Hiding information  ... 
doi:10.1145/2808475.2808480 dblp:conf/ccs/CrousePF15 fatcat:4y6taqhohrdbdjbrxkbor524vm

Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering

Wei Li, R.B. Vaughn
2006 Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)  
A cost/benefit analysis was used for more accurate quantitative analysis of attack scenarios.  ...  In this paper, we define a process to model and simulate attack scenarios in networked environments.  ...  Acknowledgements The authors wish to thank the colleagues at the Center for Computer Security Research (CCSR) at Mississippi State University for their continuous support.  ... 
doi:10.1109/hicss.2006.353 dblp:conf/hicss/LiV06 fatcat:jd7fyuvglbaqpdelwrh4rag3ei
« Previous Showing results 1 — 15 out of 253,587 results