Model for network behaviour under viral attack
نویسندگان
چکیده
Computer viruses, worms and Trojan horses pose the most severe intrusion threat against an automated environment, especially if this environment is distributed and the ability to enforce physical access control is very limited. These structures are also collectively referred to as malicious software. In this paper, a model for viral attacks against computer networks is being developed. The soundness of the model is being tested via simulation experiments. Interesting results that can be practically useful to network administrators are being derived.
منابع مشابه
Modelling of Stress-Strain Behaviour of Clayey Soils Using Artificial Neural Network
In this research, behaviour of clayey soils under triaxial loading is studied using Neural Network. The models have been prepared to predict the stress-strain behaviour of remolded clays under undrained condition. The advantage of the model developed is that simple parameters such as physical characteristics of soils like water content, fine content, Atterberg limits and so on, are used to mode...
متن کاملModelling of Stress-Strain Behaviour of Clayey Soils Using Artificial Neural Network
In this research, behaviour of clayey soils under triaxial loading is studied using Neural Network. The models have been prepared to predict the stress-strain behaviour of remolded clays under undrained condition. The advantage of the model developed is that simple parameters such as physical characteristics of soils like water content, fine content, Atterberg limits and so on, are used to mode...
متن کاملPREDICTION OF LOAD DEFLECTION BEHAVIOUR OF TWO WAY RC SLAB USING NEURAL NETWORK APPROACH
Reinforced concrete (RC) slabs exhibit complexities in their structural behavior under load due to the composite nature of the material and the multitude and variety of factors that affect such behavior. Current methods for determining the load-deflection behavior of reinforced concrete slabs are limited in scope and are mostly dependable on the results of experimental tests. In this study, an ...
متن کاملAn Ant Colony Optimization Algorithm for Network Vulnerability Analysis
Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...
متن کاملThe Paradox of Intervening in Complex Adaptive Systems; Comment on “Using Complexity and Network Concepts to Inform Healthcare Knowledge Translation”
This commentary addresses two points raised by Kitson and colleagues’ article. First, increasing interest in applying the Complexity Theory lens in healthcare needs further systematic work to create some commonality between concepts used. Second, our need to adopt a better understanding of how these systems organise so we can change the systems overall behaviour, creates a paradox. We seek to m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computer Communications
دوره 19 شماره
صفحات -
تاریخ انتشار 1996