23,766 Hits in 4.8 sec

Topological analysis of network attack vulnerability

Sushil Jajodia
2007 Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07  
In this chapter, we describe a tool that implements an integrated, topological approach to network vulnerability analysis.  ...  Our Topological Vulnerability Analysis (TVA) tool automates the labor-intensive type of analysis usually performed by penetration-testing experts.  ...  In the context of network security, our assumption of monotonicity is quite reasonable.  ... 
doi:10.1145/1229285.1229288 dblp:conf/ccs/Jajodia07 fatcat:b4jz5yci7newdlzxjis5xiwaku

Topological analysis of network attack vulnerability

Sushil Jajodia
2006 Proceedings of the 2006 International Conference on Privacy, Security and Trust Bridge the Gap Between PST Technologies and Business Services - PST '06  
In this chapter, we describe a tool that implements an integrated, topological approach to network vulnerability analysis.  ...  Our Topological Vulnerability Analysis (TVA) tool automates the labor-intensive type of analysis usually performed by penetration-testing experts.  ...  ACKNOWLEDGEMENTS We gratefully acknowledge the software development efforts of Michael Jacobs in support of this chapter.  ... 
doi:10.1145/1501434.1501437 dblp:conf/pst/Jajodia06 fatcat:3xk6eikaendofjprkfm5gnczfm

An Improved Model for Analysis of Host Network Vulnerability

Ramchandra Yadav, Raghu Nath, Anil Kumar
2016 International Journal of Computer Applications  
Network security depends on most of network configuration and vulnerabilities. Each machines overall susceptibility to attack depends upon the vulnerabilities of another machine.  ...  Such a series is known as attack path and the set of all possible paths will form an attack graph. By their highly interdependencies, it is much complex to draw traditional vulnerability analysis.  ...  Topological Vulnerability Analysis (TVA) Modeling tools such as Topological Vulnerability Analysis (TVA) is comes in market to generate attack graphs automatically [18] .  ... 
doi:10.5120/ijca2016911216 fatcat:4chi74tfurhqjbmpylpsd47s3y

Networks Security models Scalability Analysis

Kamal Aldin Yousif Yaseen
2019 Mağallaẗ al-ʿulūm al-handasiyyaẗ wa-al-tiknūlūğiyā al-maʿlūmāt  
case computational complexity analyses based on fully connected topology, but real life networked systems run on various network topologies, and other factors that affect the overall performances of security  ...  There is an emerging scalability problem with existing security models as the size of the networked systems becoming larger, especially when analyzing all possible attack scenarios. presented the worst  ...  This research shows the scalability of security models used for a large sized Networked system, A performance analysis was conducted to demonstrate how Different security models, namely the HARM and the  ... 
doi:10.26389/ajsrp.k270119 fatcat:2my5w7hiazbhnm6zlm5pk5uk6y

Performance Analysis of Scalable Attack Representation Models [chapter]

Jin B. Hong, Dong Seong Kim
2013 IFIP Advances in Information and Communication Technology  
The optimal number of reachability groups is not analysed. Their analysis or simulation did not consider different network topologies or variable number of vulnerabilities.  ...  The analysis did not consider different network topologies, variable number of vulnerabilities in their analyses and simulations, and vulnerabilities giving different privileges when exploited.  ... 
doi:10.1007/978-3-642-39218-4_25 fatcat:n25shpxa2zbq5fjnxz3ubudvpq

Measuring Road Network Topology Vulnerability by Ricci Curvature [article]

Lei Gao, Xingquan Liu, Yu Liu, Pu Wang, Min Deng, Qing Zhu, Haifeng Li
2019 arXiv   pre-print
This article provides a new perspective on a geometry to analyze the vulnerability of a road network and describes the inherent nature of the vulnerability of a road system from a new perspective.  ...  The results show that our method performs better than complex network statistics on measuring the vulnerability of a road network.  ...  TNRT Analysis The topology transmission measurement based on Ricci curvature measures the road networks topology.  ... 
arXiv:1811.05743v2 fatcat:6pkrg4cvpfgtrjvfnsk3wsutf4

The Implementation of a Vulnerability Topology Analysis Method for ICS

Yi Lin Yang, Ji Teng Wang, Guo Ai Xu, W.-P. Sung, J.C.M. Kao
2016 MATEC Web of Conferences  
So, this paper focuses on the vertex polymerization of the topological vulnerability analysis. We realized a topological analysis method oriented ICSs on the basis of achievements at home and abroad.  ...  At the same time, the traditional vulnerability scan technology lacks the ability to recognize the interactions between vulnerabilities in the network. ICSs are always in a high risk state.  ...  Acknowledgment This work is supported by National Natural Science Foundation of China Project (61302087, 61401038, U153 610079).  ... 
doi:10.1051/matecconf/20164402032 fatcat:r5u7gewepncazom4b4vowmunkq

Topological Characteristics and Vulnerability Analysis of Rural Traffic Network

Xia Zhu, Weidong Song, Lin Gao
2019 Journal of Sensors  
By analyzing the attack tolerance of RTN under the condition of different attack patterns, we find that the road level weight traffic network has a good performance to represent the vulnerability of RTN  ...  Secondly, Random Attack (RA) and Deliberate Attack (DA) strategies are used to analyze network vulnerability in three rural traffic network models.  ...  Section 2.2 gives the topological feature analysis of the three networks. Section 2.3 implements the vulnerability analysis by three networks under the condition of two kinds of attacks. . .  ... 
doi:10.1155/2019/6530469 fatcat:ynr2j5p66zcshmt6hwbmku56ie

Probabilistic security analysis through path-based metric evaluation in wireless sensor networks

Sampath Kumar Pattem, Jayasankar K, Sumalatha V
2018 International Journal of Engineering & Technology  
A simple comparative analysis is carried out in this paper between different topologies of network through the path based metrics.  ...  Since there exists number of path metrics, some metrics are categorized as decisive and some are assistive and based on the obtained count, one network topology is finalized as more secure.  ...  The network topology is realized here by considering the vulnerabilities and conditions as nodes. The above figure gives a realization for the architecture of network topology 1.  ... 
doi:10.14419/ijet.v7i2.8.10348 fatcat:xl4jl4tzsnanjpm5qwzysnk6vq

Topology Modeling and Vulnerability Analysis of China Mine Power Grid Based on Complex Network Theory

Junji Wang, Caoyuan Ma, Chunxiao Li, Xinshang Zhu, Kang Zhao
2016 International Journal of Grid and Distributed Computing  
A structural vulnerability analysis of China mine power grid, which considering the particular of topological structure and the increase gas power generation nodes, is proposed based on complex network  ...  the structural vulnerability of mine power grid to have a fault simulation of the mine power grid before and after adding gas power generation nodes.  ...  Vulnerability Analysis of Mine Power Grid The simulated fault attack of mine power grid is divided in two modes, which are node attacks and edge attacks.  ... 
doi:10.14257/ijgdc.2016.9.10.07 fatcat:7pl6beg2qrb3fg3w6l6664g5g4

Vulnerability Analysis of Urban Rail Transit Networks: A Case Study of Shanghai, China

Daniel Sun, Yuhan Zhao, Qing-Chang Lu
2015 Sustainability  
It is identified that the urban rail transit network is rather robust to random attacks, but is vulnerable to the largest degree node-based attacks and the highest betweenness node-based attacks.  ...  In this paper, the network and station vulnerabilities of the urban rail transit system were analyzed based on complex network and graph theories.  ...  Yuhan Zhao analyzed the network data and passenger IC card data, carried out the vulnerability evaluation model, and performed the station vulnerability analysis using Shanghai Metro data.  ... 
doi:10.3390/su7066919 fatcat:vl7suxl3orfz5myydymbtrnbmy

Coagulation Attacks over Networked UAVs: Concept, Challenges, and Research Aspects

Vishal Sharma, Dushantha Nalin K. Jayakody, Kathiravan Srinivasan, Ravinder Kumar
2018 International Journal of Engineering & Technology  
These attacks lead to a large number of vulnerabilities causing fatal incidents. A new attack is introduced in this paper termed as "Coagulation Attack".  ...  Aerial nodes are prone to various types of attack in a network such as Sybil attack, wormhole attack, sinkhole attack, or impersonation attack.  ...  Acknowledgement This work was funded by the framework of Competitiveness Enhancement Program of the National Research Tomsk Polytechnic University No. TPU CEP_IC_110\2017.  ... 
doi:10.14419/ijet.v7i3.13.17329 fatcat:wm6wfyrwwjeo7jmrexmj7rhyei

Fast Network Attack Modeling and Security Evaluation based on Attack Graphs

Igor Kotenko, Andrey Chechulin
2014 Journal of Cyber Security and Mobility  
The novelty of the proposed approach is the use of special algorithms for construction, modification and analysis of attack graphs aimed at rapid security evaluation.  ...  It is based on modeling of computer network and malefactors' behaviors, building attack graphs, processing current alerts for real-time adjusting of particular attack graphs, calculating different security  ...  Acknowledgment This research is being supported by the grants of the Russian Foundation of Basic Research (13-01-00843, 13-07-13159, 14-07-00697, 14-07-00417), the Program of fundamental research of the  ... 
doi:10.13052/jcsm2245-1439.312 fatcat:5rjjqpqapvhnzpidynjlmigq4i

Advances in Topological Vulnerability Analysis

Steven Noel, Matthew Elder, Sushil Jajodia, Pramod Kalapa, Scott O'Hare, Kenneth Prole
2009 2009 Cybersecurity Applications & Technology Conference for Homeland Security  
We describe a Topological Vulnerability Analysis (TVA) approach that analyzes vulnerability dependencies and shows all possible attack paths into a network.  ...  The organization of networks and the interdependencies of vulnerabilities are so complex as to make traditional vulnerability analysis inadequate.  ...  Our approach to such full-context security is called Topological Vulnerability Analysis (TVA) [1] [2] .  ... 
doi:10.1109/catch.2009.19 fatcat:55zoqgjmmvffzasat3rlw3ivla

A Scalable, Vulnerability Modeling and Correlating Method for Network Security [chapter]

Xuejiao Liu, Debao Xiao, Nian Ma, Jie Yu
2009 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Recent works in network security have demostrated the fact that combinations of vulnerability exploits are the typical means by which an attacker can break into a network.  ...  Modeling provides a concise representation for expressing fact base such as host configuration, vulnerability information, and network topology.  ...  The goal of network security analysis is to link up individual vulnerabilities using host configuration information in conjunction with network topology, then find the most vulnerable one to take timely  ... 
doi:10.1007/978-3-642-10485-5_16 fatcat:pg4vo5xcr5dlze3ros7knek2qq
« Previous Showing results 1 — 15 out of 23,766 results