Abstract | ||
---|---|---|
It is important for trusted intranets to focus on network security as a whole with dynamic and formalized analysis. The qualitative and current quantitative methods have difficulties to reach the requirements. After analyzing the attacking process, a Jackson network-based model with absorbing states is proposed, where the absorbing states mean the attacks succeed or fail. We compute the steady-state joint probability distribution of network nodes, the mean time of attack data spent in network, and the probabilities from the network entry node to absorbing states. According to the analysis of the above measures, we analyze the relationship between network security and performance. |
Year | DOI | Venue |
---|---|---|
2005 | 10.1007/11427995_52 | Lecture Notes in Computer Science |
Keywords | Field | DocType |
absorbing state,attack data,quantitative analysis,current quantitative method,network security,jackson network-based model,mean time,attacking process,network entry node,formalized analysis,network node,steady state,jackson network,model based reasoning,conditional probability,joint distribution,network analysis,probability distribution,social psychology,confidence,artificial intelligence,computer security,quantitative method | Joint probability distribution,Conditional probability,Computer science,Computer security,Network security,Operations research,Node (networking),Network simulation,Computer network,Model-based reasoning,Network analysis,Jackson network | Conference |
Volume | ISSN | ISBN |
3495 | 0302-9743 | 3-540-25999-6 |
Citations | PageRank | References |
0 | 0.34 | 4 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Zhengtao Xiang | 1 | 16 | 4.58 |
Yufeng Chen | 2 | 2 | 1.31 |
Wei Jian | 3 | 0 | 0.34 |
Fei Yan | 4 | 0 | 0.68 |