An Ontology for Network Security Attacks

Author(s):  
Andrew Simmonds ◽  
Peter Sandilands ◽  
Louis van Ekert
2010 ◽  
Vol 20-23 ◽  
pp. 849-855 ◽  
Author(s):  
Yuan Quan Shi ◽  
Tao Li ◽  
Wen Chen ◽  
Rui Rui Zhang

To effectively prevent large-scale network security attacks, a novel Predication Approach for Network Security Situation inspired by Immunity (PANSSI) is proposed. In this predication approach, the concepts and formal definitions of antigen and antibody in the network security situation predication domain are given; meanwhile, the mathematical models of some antibody evolution operators being related to PANSSI are exhibited. By analyzing time series and computing the affinity between antigen and antibody in artificial immune system, network security situation predication model is established, and then the future situation of network security attacks is predicted by it. Experimental results prove that PANSSI can forecast the future network security situation real-timely and correctly, and provides a novel approach for network security situation predication.


IJARCCE ◽  
2019 ◽  
Vol 8 (8) ◽  
pp. 29-33
Author(s):  
Eng. Anwar J. Alzaid

2011 ◽  
Vol 143-144 ◽  
pp. 859-863
Author(s):  
Hao Wang ◽  
Guo Zhen Tan ◽  
Li Dong Liu

Security of authentication protocol is an important factor to network security. To ensure protocol security, attacks on authentication protocol were classified from the aspect of security theory and implement. On this basis, an authentication protocol security assessment was discussed. The framework determines security risk of authentication from security of password system, vulnerability of protocol itself and environment threat possibility. It can be used to assess security and capability to resist risks objectively


2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
Lan Liu ◽  
Jun Lin ◽  
Pengcheng Wang ◽  
Langzhou Liu ◽  
Rongfu Zhou

Based on the design idea of future network, this paper analyzes the network security data sampling and anomaly prediction in future network. Through game theory, it is determined that data sampling is performed on some important nodes in the future network. Deep learning methods are used on the selected nodes to collect data and analyze the characteristics of the network data. Then, through offline and real-time analyses, network security abnormal events are predicted in the future network. With the comparison of various algorithms and the adjustment of hyperparameters, the data characteristics and classification algorithms corresponding to different network security attacks are found. We have carried out experiments on the public dataset, and the experiment proves the effectiveness of the method. It can provide reference for the management strategy of the switch node or the host node by the future network controller.


Author(s):  
Wael Alzaid ◽  
Biju Issac

IPv6 provides more address space, improved address design, and greater security than IPv4. Different transition mechanisms can be used to migrate from IPv4 to IPv6 which includes dual stack networks, tunnels and translation technologies. Within all of this, network security is an essential element and therefore requires special attention. This paper analyses two transition technologies which are dual stack and tunnel. Both technologies are implemented using Cisco Packet Tracer and GNS3. This work will also analyse the security issues of IPv6 to outline the most common vulnerabilities and security issues during the transition. Finally, the authors will design and implement the dual stack, automatic and manual tunnelling transition mechanisms using Riverbed Modeler simulation tool to analyse the performance and compare with the native IPv4 and IPv6 networks.


Author(s):  
Lalitha Bhagavathi Gurajada ◽  
Sai Deepthi Rajaputra ◽  
Indira Gogineni ◽  
Riaz Shaik

In today’s world, Security is the prime concern for each application. Network security and Computer protection are the serious issues. A broad range of Wireless Sensor Networks (WSNs) applications[1][15] are widely used in military, researches etc. The key subject of computing is to provide network security several types of attacks are increasing day by day. The attacks present in different layers are produced due to the susceptibilities present in the layers. The Seven layers in OSI model are formulated to convey the information from highest layer to lowest layer. Broadcast of data gets modified according to the layer in which it lies. Individually every layer is weak to different types of attacks. This paper models about the different attacks present in each layer of OSI.  


2018 ◽  
Vol 9 (5) ◽  
pp. 50-54
Author(s):  
PRATISHTHA SAXENA ◽  
◽  
VIJAY TIWARI ◽  

2020 ◽  
Author(s):  
Milon Biswas ◽  
Nazmus Sakeef ◽  
Hisham Siddique

Abstract Various types of encryption technologies have been used for many years to protect information. The purpose of this article is to create a new method called Vigenere-Multiplicative cipher. Here we develop an algorithm and its algebraic description. In addition, it provides frequency analysis for this method. In addition, a brief description of the method implementation, security attacks, and comparisons between specific ciphers and the most common ciphers.


Sign in / Sign up

Export Citation Format

Share Document