Computer Network Attack Modeling and Network Attack Graph Study

2014 ◽  
Vol 1079-1080 ◽  
pp. 816-819 ◽  
Author(s):  
Yuan Qin

With the development of computer network and rapid popularity of Internet, network information security has become the focus of safeguarding national security and social stability. In the network security event, the hacker often can’t successfully intrude into the network by means of a single host / services hacker. With the help of various kinds of "vulnerability" generated bydifferent relationship existing in multiple point multiple host, the hacker can achieve the purpose of network intrusion. Therefore one important aspect of network security is after obtaining the vulnerability of the network information, considering a combination of multiple exploits and analyzing the attack path of network penetration attacks that the attacker may take.

2014 ◽  
Vol 513-517 ◽  
pp. 1779-1782
Author(s):  
Zheng Chan Rao ◽  
Tian Yin Pu

The computer network attack graph generation method obtained mostly through network scanning, this network reachability information, this approach takes a long presence information and incomplete defects by analyzing network reachability main task of research and developing trends is proposed based on binary decision diagrams algorithm approach to achieve network reachability studies. The algorithm uses the decision diagram modeling firewall rules, through the collection operations to achieve network reachability studies.


2013 ◽  
Vol 756-759 ◽  
pp. 791-795
Author(s):  
Ling Jia

The rapid development of computer network technology and information technology, brings greatly facilitate and enrich people's lives for information transfer and fast access, improves work efficiency. At the same time, the network information security is followed. How to ensure the network information is transferred security, which is the problem that various network information systems must face, and also a difficult and hot issue to be researched. In this paper, a variety of effective network security technologies are studied and corresponding implementations are provided for the information network system in the university.


2014 ◽  
Vol 971-973 ◽  
pp. 1440-1443 ◽  
Author(s):  
Yan Kun Zhang

Networksecurity network system is presented, including hardware, software, and itstransmission in the network information security, network security threatsmainly include: software vulnerabilities, improper configuration, safetyconsciousness is not strong, virus, hacker attacks, etc. Is not only afirewall, network security is not anti-virus, intrusion monitoring, firewall,identity authentication, encryption, and other products of simple stack, butfrom the system to the application, from the device to the service ofrelatively complete, the system of the combination of security products.


2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Ma Yuanyuan

It is possible to improve the safety performance of the radio network by accurately identifying the attack signal path in the radio network information. When the attack signal path identification is carried out, it is necessary to calculate the vulnerability of the attack signal path, obtain the time series sample set of the net-work attack path, train the sample set for different vulnerabilities, and complete the path recognition.The traditional method is to establish the attack graph model. It cannot calculate the vulnerability of the attack signal path and cannot carry out the training, which leads to the limitation of the path recognition and the low efficiency. An improved identification method of attack signal path in radio network information with improved attack graph is proposed. Firstly, the attack map of the traditional method is transformed according to the theory of graph theory, and the concept of vulnerability factor is introduced into the improved attack graph. The vulnerability of the attack route is improved, and then the sliding time window is used to construct the network attack path recognition Time series sample set, Ada-Boosting method is used to train the sample sets with different vulnerabilities,and the regression matrix is obtained by using the training results. Finally, the attack signal path identification in the radio network information is completed.The simulation results show that the improved method has high accuracy and can guarantee the smooth operation ofthe radio network.


In computer network, security of the network is a major issue and intrusion is the most common threats to security. Cyber attacks detection is becoming more enlightened challenge in detecting these threats accurately. In network security, intrusion detection system (IDS) has played a vital role to detect intrusion. In recent years, numerous methods have been proposed for intrusion detection to detect these security threats. This survey paper study examines recent work in the topic of network security, machine learning based techniques as well as a discussion of the many datasets that are commonly used to evaluate IDS. It also explains how researchers employ Machine Learning Based Techniques to detect intrusions


2015 ◽  
Vol 28 (5) ◽  
pp. 2029-2035 ◽  
Author(s):  
Jin-cheng Guo ◽  
Dan Fan ◽  
Hao-yuan Che ◽  
Yun-na Duan ◽  
Hong-Su Wang ◽  
...  

2014 ◽  
Vol 1044-1045 ◽  
pp. 1298-1301
Author(s):  
Qian Wu

Early network development, people more emphasis on network convenience and availability, and ignore the security of the network. With the development of computer network technology, when people run in the network critical business such as banking, when government activity is increasingly networked, computer network security has become a problem that not allows to ignore. In this paper, the existing network security technology to prevent the analysis and comparison, especially to strengthen security measures should be taken in order to do a more in-depth discussion, and describes the future development trend of this research field.


2014 ◽  
Vol 539 ◽  
pp. 305-309
Author(s):  
Li Na Dong

With the increasingly advanced computer information network, a great convenience for people's daily work and life at the same time, the network security problem arises. Network security is not only related to the enterprises, institutions and social groups, network information security, is also related to the national security and social stability, Involves many disciplines of computer science, network technology, communication technology, security technology and techniques. Solve the problem of computer network security has become the most important research topics in the field of computer science. Starting from the characteristics of the computer information network security and network security factors, a network security system designed set includes virus protection, dynamic password authentication, firewall access control, information encryption, intrusion detection and other protective measures for our computer the improvement and development of the information Network Security provides a useful reference.


2014 ◽  
Vol 599-601 ◽  
pp. 1457-1460
Author(s):  
Xue Yong Wan ◽  
Liang Zhang ◽  
Wei Xu ◽  
Hong Hui Gong

Internet technology in the life to people bring convenient while, also is facing increasingly serious security threat from the network, many invaders one thousand ways to want to "see" to some concerned data or information, computer network information security is more and more attention. This article, from the perspective of the system vulnerability and network own existence safe hidden trouble, put forward to realize protection methods and strategies of network security.


Sign in / Sign up

Export Citation Format

Share Document