Network attack strategy digging based on object Petri net

Author(s):  
Chun-zi Wang ◽  
Guang-qiu Huang
2013 ◽  
Vol 367 ◽  
pp. 441-446
Author(s):  
Wei Zhu Zhong ◽  
Xiao Qing Fu ◽  
Ya Ping Wang

This paper presents a new redesigned solution on Container Terminal Production Controlling System, which goal is to correct defects existing and to rebuild business processes with lower cost, higher quality, flexible, faster and more intelligent responsiveness to whole system. The model of BPR is confirmed by the method of Logistic Object Petri Net.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Zenan Wu ◽  
Liqin Tian ◽  
Yi Zhang ◽  
Yan Wang ◽  
Yuquan Du

At present, most network security analysis theory assumes that the players are completely rational. However, this is not consistent with the actual situation. In this paper, based on the effectiveness constraints on both sides with network attack and defense, with the help of stochastic Petri net and evolutionary game theory, the Petri net model of network attack and defense stochastic evolutionary game is reconstructed, the specific definition of the model is given, and the modeling method is given through the network connection relationship and attack and defense strategy set. Using this model, a quantitative analysis of network attack events is carried out to solve a series of indicators related to system security, namely, attack success rate, average attack time, and average system repair time. Finally, the proposed model and analysis method are applied to a classic network attack and defense process for experimental analysis, and the results verify the rationality and accuracy of the model and analysis method.


Author(s):  
Kamyar Sarshar ◽  
Peter Loos

Given that business processes are performed in an organizational context, it is essential that process modeling notations provide proper mechanisms to represent the resources perspective of business processes. After relating the resource perspective within a framework to other business process perspectives and discussing the lifecycle resource models undergo, this contribution introduces the UML 2.0 activity diagrams as well as object Petri nets regarding their approach to model the resource perspective of business processes. Afterwards, the application of the notations is illustrated by a real-life process of the health-care domain. The following comparison of the notations indicates the benefits and the limitations of both notations.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 61317-61330 ◽  
Author(s):  
Yisheng An ◽  
Naiqi Wu ◽  
Pei Chen

In order to obtain certain and comprehensive information for formulating network attack strategy, a complex network attack method is proposed in this paper. The attackers’ income, loss, cost and encountered risk in network attack are analyzed and index system is established to evaluate attack effect of network node with dynamic Bayesian network. This method can overcome defects of static evaluation which is relied on single index of network topology. Simulation experiment shows that this method combines more nodes and observation during the attack. It can avoid the gap between actual attack effect and theoretical expectation when attack is implemented by relying on static evaluation. In the meanwhile, it is more accurate in attack precision and of high attack efficiency


Sign in / Sign up

Export Citation Format

Share Document