The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The increasing amount of network-based attacks evolved to one of the top concerns responsible for network infrastructure and service outages. In order to counteract these threats, computer networks are monitored to detect malicious traffic and initiate suitable reactions. However, initiating a suitable reaction is a process of selecting an appropriate response related to the identified network-based...
With the growing number of botnet attacks, the botnet detection is becoming increasingly important for the network security. To enhance the existing botnet detection systems which are short of efficient information collection functions, this paper presents a collaborative information collection model with a new 5-tuple structural mode. In the model, we introduce the static and dynamic roles to meet...
Traditional security models and single security technology cannot keep up with the change of complicated network structure and varied intrusion measure. Network security manage based on optimization has traits of low manage cost, high agility, wide applicability. This paper introduces network security management based on non-optimum system theory into new network security model, and emphases on its...
This paper describes a new approach for network security based on the combination of biological intrusion prevention and self-healing concepts. The presented system integrates an artificial immune intrusion prevention system for network security inspired by immunological theory known as danger theory. The approach is based upon data inspired by the human immune system (HIS). The IPS analyzes the malicious...
One of the most prevalent security problems in network is the rampant propagation of email worms. In this paper game theory is suggested as a method for modeling and computing the probabilities of expected behaviors of email users in the email worm propagation process. The game situation models the actions of the email users under the condition that at the time they open an attachment, the system...
Dealing with network security requires knowledge of the attacker. The question of attacker motivations is complex. This paper is a literature review examining whether attacker motivations are homogenous or heterogeneous. This is part of an ongoing research effort to characterize system attackers with the goal of helping to mold policy decisions.
From the network birth to the vigorous development, as well as many concomitant security problems, all symbolized the network developing process approaches the ecological organization evolution process. But today's tradition network security defense architecture is exposing the mechanical and stiff malpractice gradually, which is unable to deal with a variety of the security threats that are latent...
Network security is attracting more and more attention. Simulation is a better choice to research the problems of network security because of their high complexity. Based on the purpose and actuality of simulation of network security, this paper puts forward a simulation method of network security using system dynamics. After giving the steps of system dynamics simulation of network security, this...
Individuals in computer networks not only have to invest to secure their private resources from potential attackers, but have to be aware of the existing interdependencies that exist with other network participants. Indeed, a user's security is frequently negatively impacted by protection failures of even just one other individual, the weakest link. In this paper, we are interested in the impact of...
This paper suggests that evolutionary models of network infrastructure in market economy can be derived from the underlying selfish behavior of users and providers of network services in the same way as non-equilibrium thermodynamics is derived from the underlying statistical physics of interacting particles. This approach may be useful for overcoming restrictions of existing models failing to account...
Considering honeypot host performs high inveiglement to worms and its data control policy-"come in easily, out strictly", this paper presents a worm propagation model based on two-factor model in the network which distributed honeynet have been deployed, then discusses worm propagation trend and the impact of honeypot on worm spread; over simulation experiment, we find that distributed honeynet...
A new model of network security assessment is proposed in this paper. A single IT entity is evaluated through EAL; The composite IT entities are evaluated by CAP. The model analyzes the security value of network elements, and adopts the Geometric mean method to determine the security value of the entire network. The effectiveness of this method is validated through the evaluation of a practical system.
Organizations face increasing challenges in addressing and preventing computer and network security incidents. There are financial consequences from security incidents. These include lost time and resources used during recovery, possible theft of personal and/or proprietary information, and reputational damage that may negatively impact stock prices or reduce consumer confidence in a company. Being...
Success of Digital Ecosystem depends on a reliable supporting infrastructure that offers and transports services and information thereby empowers the business system to function properly. This implies the utmost importance to maintain the reliability, confidentiality and integrity of the network and communication systems. This paper reports an initial pilot study on the use of a simulation game called...
In recent years, organizations have been shifting focus to their core business competencies, and reducing total cost of ownership (TCO) associated with training and management of their IT infrastructure. In the same motif, organizations are establishing security and survivability frameworks as an integral part of their business strategy so as to provide an acceptable quality-of-service for their clients...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.