scholarly journals Dynamic network security deployment under partial information

Author(s):  
George Theodorakopoulos ◽  
John S. Baras ◽  
Jean-Yves Le Boudec
2018 ◽  
Vol 16 (1) ◽  
pp. 656-668 ◽  
Author(s):  
M.T. Trobajo ◽  
J. Cifuentes-Rodríguez ◽  
M.V. Carriegos

AbstractRandom Decentering Algorithm (RDA) on a undirected unweighted graph is defined and tested over several concrete scale-free networks. RDA introduces ancillary nodes to the given network following basic principles of minimal cost, density preservation, centrality reduction and randomness. First simulations over scale-free networks show that RDA gives a significant decreasing of both betweenness centrality and closeness centrality and hence topological protection of network is improved. On the other hand, the procedure is performed without significant change of the density of connections of the given network. Thus ancillae are not distinguible from real nodes (in a straightforward way) and hence network is obfuscated to potential adversaries by our manipulation.


Author(s):  
Xiaoming Li ◽  
Guangquan Xu ◽  
Changzheng Liu ◽  
Wei Yu ◽  
Zhao Liu ◽  
...  

2014 ◽  
Vol 977 ◽  
pp. 507-510
Author(s):  
Wei Wei Yao ◽  
Liang Gong ◽  
Xia Xu

Optimization of computer network security technology shift in the relationship is constantly updated. Any computer network security solutions can not be designed once and for all. How seamless integration of network security technology and network security management together to make the network security implementation strategy is very important, this paper proposes a reasonable solution to improve overall network design and optimization of the security system, to develop scientific, reliable, dynamic network security optimization design, the design of enterprise network security solutions, combined with the current firewall, intrusion detection / intrusion prevention technology, VPN technology to achieve rapid escalation of the enterprise information construction in the network security system, thus the basic realization of computer network security optimization design goal.


2010 ◽  
Vol 143-144 ◽  
pp. 239-243
Author(s):  
Zhan Fei Ma

Immune-SoftMan (ISM), a new concept, is an immune intelligent entity. ISM lives and acts in the computer network environment. It has great capabilities to deal with some things in certain circumstances without manual intervention and supervision. Comparing with Agent and Robot, ISM not only has more all-around humanized intelligence, humanized behavior and function, but also has the ability of environment identifying, network migration, self-determination and free will. In this paper, the concept, characteristics and individual overall model of ISM are presented. This system model can monitor the distributed dynamic network environment in real time, and alarm and diagnose faults in advance. On the basis of these, a novel ISM architecture is constructed and discussed. The presented architecture can achieve a self-organizing system that is more robust and flexible in dynamic network environment, and can be self-updated locally. ISM’s theory and technology fruits also provide a good foundation and reference for studying the present network security system.


Sign in / Sign up

Export Citation Format

Share Document