Trust Extended Dynamic Security Model and Its Application in Network

Author(s):  
Xiaofei Zhang ◽  
Fang Xu ◽  
Yi Liu ◽  
Xing Zhang ◽  
Changxiang Shen
2013 ◽  
Vol 347-350 ◽  
pp. 2773-2776
Author(s):  
Shi Ping Xu ◽  
Yu Han Zhang ◽  
Ying Zhou ◽  
Yong Qiang Bai ◽  
Hai Peng Fu

This paper analyzes the deficiency of P2DR security model, and proposes a kind of new active dynamic security model AD-RPPDRRM, in which risk analysis, management and recovery are imported. On the basis of this model, basic technologies used to implement the defense in depth system are discussed. At last, a defense in-depth system of a typical network is given.


Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


2017 ◽  
Vol 12 (1) ◽  
pp. 73
Author(s):  
Sandra Camila Garzon ◽  
Mario Alberto Rios ◽  
Oscar Gomez

Sign in / Sign up

Export Citation Format

Share Document