Model for network behaviour under viral attack

نویسندگان

  • Sokratis K. Katsikas
  • Thomas Spyrou
  • Dimitris Gritzalis
  • John Darzentas
چکیده

Computer viruses, worms and Trojan horses pose the most severe intrusion threat against an automated environment, especially if this environment is distributed and the ability to enforce physical access control is very limited. These structures are also collectively referred to as malicious software. In this paper, a model for viral attacks against computer networks is being developed. The soundness of the model is being tested via simulation experiments. Interesting results that can be practically useful to network administrators are being derived.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modelling of Stress-Strain Behaviour of Clayey Soils Using Artificial Neural Network

In this research, behaviour of clayey soils under triaxial loading is studied using Neural Network. The models have been prepared to predict the stress-strain behaviour of remolded clays under undrained condition. The advantage of the model developed is that simple parameters such as physical characteristics of soils like water content, fine content, Atterberg limits and so on, are used to mode...

متن کامل

Modelling of Stress-Strain Behaviour of Clayey Soils Using Artificial Neural Network

In this research, behaviour of clayey soils under triaxial loading is studied using Neural Network. The models have been prepared to predict the stress-strain behaviour of remolded clays under undrained condition. The advantage of the model developed is that simple parameters such as physical characteristics of soils like water content, fine content, Atterberg limits and so on, are used to mode...

متن کامل

PREDICTION OF LOAD DEFLECTION BEHAVIOUR OF TWO WAY RC SLAB USING NEURAL NETWORK APPROACH

Reinforced concrete (RC) slabs exhibit complexities in their structural behavior under load due to the composite nature of the material and the multitude and variety of factors that affect such behavior. Current methods for determining the load-deflection behavior of reinforced concrete slabs are limited in scope and are mostly dependable on the results of experimental tests. In this study, an ...

متن کامل

An Ant Colony Optimization Algorithm for Network Vulnerability Analysis

Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...

متن کامل

The Paradox of Intervening in Complex Adaptive Systems; Comment on “Using Complexity and Network Concepts to Inform Healthcare Knowledge Translation”

This commentary addresses two points raised by Kitson and colleagues’ article. First, increasing interest in applying the Complexity Theory lens in healthcare needs further systematic work to create some commonality between concepts used. Second, our need to adopt a better understanding of how these systems organise so we can change the systems overall behaviour, creates a paradox. We seek to m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computer Communications

دوره 19  شماره 

صفحات  -

تاریخ انتشار 1996