A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2006; you can also visit the original URL.
The file type is application/pdf
.
Filters
Topological analysis of network attack vulnerability
2007
Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07
In this chapter, we describe a tool that implements an integrated, topological approach to network vulnerability analysis. ...
Our Topological Vulnerability Analysis (TVA) tool automates the labor-intensive type of analysis usually performed by penetration-testing experts. ...
In the context of network security, our assumption of monotonicity is quite reasonable. ...
doi:10.1145/1229285.1229288
dblp:conf/ccs/Jajodia07
fatcat:b4jz5yci7newdlzxjis5xiwaku
Topological analysis of network attack vulnerability
2006
Proceedings of the 2006 International Conference on Privacy, Security and Trust Bridge the Gap Between PST Technologies and Business Services - PST '06
In this chapter, we describe a tool that implements an integrated, topological approach to network vulnerability analysis. ...
Our Topological Vulnerability Analysis (TVA) tool automates the labor-intensive type of analysis usually performed by penetration-testing experts. ...
ACKNOWLEDGEMENTS We gratefully acknowledge the software development efforts of Michael Jacobs in support of this chapter. ...
doi:10.1145/1501434.1501437
dblp:conf/pst/Jajodia06
fatcat:3xk6eikaendofjprkfm5gnczfm
An Improved Model for Analysis of Host Network Vulnerability
2016
International Journal of Computer Applications
Network security depends on most of network configuration and vulnerabilities. Each machines overall susceptibility to attack depends upon the vulnerabilities of another machine. ...
Such a series is known as attack path and the set of all possible paths will form an attack graph. By their highly interdependencies, it is much complex to draw traditional vulnerability analysis. ...
Topological Vulnerability Analysis (TVA) Modeling tools such as Topological Vulnerability Analysis (TVA) is comes in market to generate attack graphs automatically [18] . ...
doi:10.5120/ijca2016911216
fatcat:4chi74tfurhqjbmpylpsd47s3y
Networks Security models Scalability Analysis
2019
Mağallaẗ al-ʿulūm al-handasiyyaẗ wa-al-tiknūlūğiyā al-maʿlūmāt
case computational complexity analyses based on fully connected topology, but real life networked systems run on various network topologies, and other factors that affect the overall performances of security ...
There is an emerging scalability problem with existing security models as the size of the networked systems becoming larger, especially when analyzing all possible attack scenarios. presented the worst ...
This research shows the scalability of security models used for a large sized Networked system, A performance analysis was conducted to demonstrate how Different security models, namely the HARM and the ...
doi:10.26389/ajsrp.k270119
fatcat:2my5w7hiazbhnm6zlm5pk5uk6y
Performance Analysis of Scalable Attack Representation Models
[chapter]
2013
IFIP Advances in Information and Communication Technology
The optimal number of reachability groups is not analysed. Their analysis or simulation did not consider different network topologies or variable number of vulnerabilities. ...
The analysis did not consider different network topologies, variable number of vulnerabilities in their analyses and simulations, and vulnerabilities giving different privileges when exploited. ...
doi:10.1007/978-3-642-39218-4_25
fatcat:n25shpxa2zbq5fjnxz3ubudvpq
Measuring Road Network Topology Vulnerability by Ricci Curvature
[article]
2019
arXiv
pre-print
This article provides a new perspective on a geometry to analyze the vulnerability of a road network and describes the inherent nature of the vulnerability of a road system from a new perspective. ...
The results show that our method performs better than complex network statistics on measuring the vulnerability of a road network. ...
TNRT Analysis The topology transmission measurement based on Ricci curvature measures the road networks topology. ...
arXiv:1811.05743v2
fatcat:6pkrg4cvpfgtrjvfnsk3wsutf4
The Implementation of a Vulnerability Topology Analysis Method for ICS
2016
MATEC Web of Conferences
So, this paper focuses on the vertex polymerization of the topological vulnerability analysis. We realized a topological analysis method oriented ICSs on the basis of achievements at home and abroad. ...
At the same time, the traditional vulnerability scan technology lacks the ability to recognize the interactions between vulnerabilities in the network. ICSs are always in a high risk state. ...
Acknowledgment This work is supported by National Natural Science Foundation of China Project (61302087, 61401038, U153 610079). ...
doi:10.1051/matecconf/20164402032
fatcat:r5u7gewepncazom4b4vowmunkq
Topological Characteristics and Vulnerability Analysis of Rural Traffic Network
2019
Journal of Sensors
By analyzing the attack tolerance of RTN under the condition of different attack patterns, we find that the road level weight traffic network has a good performance to represent the vulnerability of RTN ...
Secondly, Random Attack (RA) and Deliberate Attack (DA) strategies are used to analyze network vulnerability in three rural traffic network models. ...
Section 2.2 gives the topological feature analysis of the three networks. Section 2.3 implements the vulnerability analysis by three networks under the condition of two kinds of attacks. . . ...
doi:10.1155/2019/6530469
fatcat:ynr2j5p66zcshmt6hwbmku56ie
Probabilistic security analysis through path-based metric evaluation in wireless sensor networks
2018
International Journal of Engineering & Technology
A simple comparative analysis is carried out in this paper between different topologies of network through the path based metrics. ...
Since there exists number of path metrics, some metrics are categorized as decisive and some are assistive and based on the obtained count, one network topology is finalized as more secure. ...
The network topology is realized here by considering the vulnerabilities and conditions as nodes. The above figure gives a realization for the architecture of network topology 1. ...
doi:10.14419/ijet.v7i2.8.10348
fatcat:xl4jl4tzsnanjpm5qwzysnk6vq
Topology Modeling and Vulnerability Analysis of China Mine Power Grid Based on Complex Network Theory
2016
International Journal of Grid and Distributed Computing
A structural vulnerability analysis of China mine power grid, which considering the particular of topological structure and the increase gas power generation nodes, is proposed based on complex network ...
the structural vulnerability of mine power grid to have a fault simulation of the mine power grid before and after adding gas power generation nodes. ...
Vulnerability Analysis of Mine Power Grid The simulated fault attack of mine power grid is divided in two modes, which are node attacks and edge attacks. ...
doi:10.14257/ijgdc.2016.9.10.07
fatcat:7pl6beg2qrb3fg3w6l6664g5g4
Vulnerability Analysis of Urban Rail Transit Networks: A Case Study of Shanghai, China
2015
Sustainability
It is identified that the urban rail transit network is rather robust to random attacks, but is vulnerable to the largest degree node-based attacks and the highest betweenness node-based attacks. ...
In this paper, the network and station vulnerabilities of the urban rail transit system were analyzed based on complex network and graph theories. ...
Yuhan Zhao analyzed the network data and passenger IC card data, carried out the vulnerability evaluation model, and performed the station vulnerability analysis using Shanghai Metro data. ...
doi:10.3390/su7066919
fatcat:vl7suxl3orfz5myydymbtrnbmy
Coagulation Attacks over Networked UAVs: Concept, Challenges, and Research Aspects
2018
International Journal of Engineering & Technology
These attacks lead to a large number of vulnerabilities causing fatal incidents. A new attack is introduced in this paper termed as "Coagulation Attack". ...
Aerial nodes are prone to various types of attack in a network such as Sybil attack, wormhole attack, sinkhole attack, or impersonation attack. ...
Acknowledgement This work was funded by the framework of Competitiveness Enhancement Program of the National Research Tomsk Polytechnic University No. TPU CEP_IC_110\2017. ...
doi:10.14419/ijet.v7i3.13.17329
fatcat:wm6wfyrwwjeo7jmrexmj7rhyei
Fast Network Attack Modeling and Security Evaluation based on Attack Graphs
2014
Journal of Cyber Security and Mobility
The novelty of the proposed approach is the use of special algorithms for construction, modification and analysis of attack graphs aimed at rapid security evaluation. ...
It is based on modeling of computer network and malefactors' behaviors, building attack graphs, processing current alerts for real-time adjusting of particular attack graphs, calculating different security ...
Acknowledgment This research is being supported by the grants of the Russian Foundation of Basic Research (13-01-00843, 13-07-13159, 14-07-00697, 14-07-00417), the Program of fundamental research of the ...
doi:10.13052/jcsm2245-1439.312
fatcat:5rjjqpqapvhnzpidynjlmigq4i
Advances in Topological Vulnerability Analysis
2009
2009 Cybersecurity Applications & Technology Conference for Homeland Security
We describe a Topological Vulnerability Analysis (TVA) approach that analyzes vulnerability dependencies and shows all possible attack paths into a network. ...
The organization of networks and the interdependencies of vulnerabilities are so complex as to make traditional vulnerability analysis inadequate. ...
Our approach to such full-context security is called Topological Vulnerability Analysis (TVA) [1] [2] . ...
doi:10.1109/catch.2009.19
fatcat:55zoqgjmmvffzasat3rlw3ivla
A Scalable, Vulnerability Modeling and Correlating Method for Network Security
[chapter]
2009
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Recent works in network security have demostrated the fact that combinations of vulnerability exploits are the typical means by which an attacker can break into a network. ...
Modeling provides a concise representation for expressing fact base such as host configuration, vulnerability information, and network topology. ...
The goal of network security analysis is to link up individual vulnerabilities using host configuration information in conjunction with network topology, then find the most vulnerable one to take timely ...
doi:10.1007/978-3-642-10485-5_16
fatcat:pg4vo5xcr5dlze3ros7knek2qq
« Previous
Showing results 1 — 15 out of 23,766 results