Methodology of iterative attack modelling in large computer networks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Iterative multi-level modelling. A methodology for computer system design

The paper presents a method of modelling a computer system design as it evolves, so that evaluation can be made an integral part of the design process. The paper introduces the concept of concurrent existence, within a single model, of several representations of the system being modelled, at differing levels of abstraction. Thus important design decisions are expressed directly in terms of appr...

متن کامل

Topological modelling of large networks.

In a complex network, there is a strong interaction between the network's topology and its functionality. A good topological network model is a practical tool as it can be used to test 'what-if' scenarios and it can provide predictions of the network's evolution. Modelling the topology structure of a large network is a challenging task, since there is no agreement in the research community on w...

متن کامل

Attack-Aware Cooperative Spectrum Sensing in Cognitive Radio Networks under Byzantine Attack

Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduc...

متن کامل

Towards the Attack Signatures’ Comparison in Survivable Computer Networks

Survivability architecture and run-time attack detection can be successfully implemented based on attack signatures. In this paper, authors concentrate on profile signatures based on Markov models. They are represented by the frequency spectrum of the functionalities in the system. The difference between safe system signatures from attacked (monitored) system signatures indicates possible intru...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SPIIRAS Proceedings

سال: 2014

ISSN: 2078-9599,2078-9181

DOI: 10.15622/sp.23.3