Sensitivity Analysis for Vulnerability Mitigation in Hybrid Networks

نویسندگان

چکیده

The development of cyber-assured systems is a challenging task, particularly due to the cost and complexities associated with modern hybrid networks architectures, as well recent advancements in cloud computing. For this reason, early detection vulnerabilities threat strategies are vital for minimising risks enterprise configured variety node types, which called networks. Existing vulnerability assessment techniques unable exhaustively analyse all dynamic IT networks, utilise wide range IoT industrial control devices (ICS). This could lead having less optimal risk evaluation. In paper, we present novel framework mitigation nodes, including traditional their dependability on devices, systems. adopts avoid, reduce, manage its core principles characterising strategies. Our results confirmed effectiveness our strategy framework, took criticality, network topology into account. showed that proposed was highly effective at reducing resource constraint environments, contrast existing literature.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Measuring Road Network Vulnerability with Sensitivity Analysis

This paper focuses on the development of a method for road network vulnerability analysis, from the perspective of capacity degradation, which seeks to identify the critical infrastructures in the road network and the operational performance of the whole traffic system. This research involves defining the traffic utility index and modeling vulnerability of road segment, route, OD (Origin Destin...

متن کامل

Scenario and Sensitivity Analysis for Flooding Vulnerability using Genetic Algorithms

We try to answer the question: "can we 'modify' our neighborhoods to make them less vulnerable to flooding?" We minimize flooding vulnerability for a city in the central plain of Luzon, by modeling the city as a biological organism with 'traits', and try to 'breed' a 'champion' city (with a low flooding vulnerability) via a genetic algorithm. The result is a description of the traits the barang...

متن کامل

Modeling TCP/IP Networks Topology for Network Vulnerability Analysis Modeling TCP/IP Networks Topology for Network Vulnerability Analysis

The distributed nature and complexity of computer networks and various services provided via them, makes the networks vulnerable to numerous attacks. The TCP/IP presumptions which are based on using this protocol to provide a simple, open communication infrastructure in an academic and collaborative environment, causes this protocol lack of built-in mechanisms for authentication, integrity and ...

متن کامل

ANN-DEA Integrated Approach for Sensitivity Analysis in Efficiency Models

Here, we examine the capability of artificial neural networks (ANNs) in sensitivity analysis of the parameters of efficiency analysis model, namely data envelopment analysis (DEA). We are mainly interested to observe the required change of a group of parameters when another group goes under a managerial change, maintaining the score of the efficiency. In other words, this methodology provides a...

متن کامل

Sensitivity Analysis of Aquacrop Model for Barley in Pakdasht Region

In recent years, a lot of research has been done on the Aquacrop model, the results show that this model simulates the product performance for deficit irrigation conditions. But this model, like other models, is sensitive to values of independent variables (model inputs). In this research, the sensitivity of the Aquacrop model was analyzed for 4 input parameters of reference evapotranspiration,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2022

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics11020238