An Optimized Method for Real Time Network Security Quantification

2009 ◽  
Vol 32 (4) ◽  
pp. 793-804 ◽  
Author(s):  
Wei-Ming LI ◽  
Jie LEI ◽  
Jing DONG ◽  
Zhi-Tang LI
Keyword(s):  
2020 ◽  
Vol 157 ◽  
pp. 04027 ◽  
Author(s):  
Sergey Ageev ◽  
Vladimir Karetnikov ◽  
Evgeny Ol’khovik ◽  
Andrey Privalov

In the paper, an adaptive hybrid heuristic (behavioral) method for detecting small traffic anomalies in high-speed multiservice communication networks, which operates in real time, is proposed and investigated. The relevance of this study is determined by the fact that network security management processes in high-speed multiservice communication networks need to be implemented in a mode close to real-time mode, as well as identifying possible network security threats in the early stages of the implementation of possible network attacks. The proposed method and algorithm belong to the class of adaptive methods and algorithms with preliminary training. The average relative error in estimating the evaluated traffic parameters does not exceed 10%, which is sufficient for the implementation of operational network management tasks. Anomalies of the expectation of traffic intensity and its dispersion are identified if their valuesexceed the normal values by 15% or more, which makes it possible to detect possible network attacks in the early phases of their implementation, for example, at the stage of scanning ports and interfaces of the attacked system. The procedure for detecting anomalous traffic behavior is implemented based on the Mamdani’s method of hierarchical fuzzy logical inference. A study of the proposed method for detecting anomalous behavior of network traffic showed its high efficiency.


2018 ◽  
Author(s):  
Sara Tamy ◽  
Rabbah Nabila ◽  
Rabbah Mahmoud Almostafa ◽  
Rifi Mounir ◽  
Belhadaoui Hicham

The proposed smart grid infrastructure aims to make use of the existing public networks such as internet for data communication between consumer premises to the public power utility network. The smart-grid adopts smart-meters which basically collect vast amount of data to provide a holistic view of the connected load behavior and preferences pattern related to power and water consumption. The smart-grids provide benefits to the utilities and consumers alike. For utilities the benefits are real time data collection, ease of power management, and reduced personnel requirement. The benefits for the users on the other hand include availability of real time usage data, providing information on ways to minimize power consumption, monetary savings and so on. Since, the smart-grid uses existing public networks the utilities do not have the burden of installing any new infrastructure (except for installing the smart-meters), thus an added advantage. But, the downside of using the public network is susceptibility to a variety of network attacks, if not guarded well against. This paper talks about the various network security vulnerabilities that exist and the measures to patch the same before employing in the smart grid networks.


Sign in / Sign up

Export Citation Format

Share Document