Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
…
24 pages
1 file
-ATTRIBUTED BY ROGER NEEDHAM AND BUTLER LAMPSON TO EACH OTHER
2015
Maintaining the security of critical infrastructure networks is vital for a modern economy. This paper examines a game-theoretic model of attack and defense of a network in which the defender's objective is to maintain network connectivity and the attacker's objective is to destroy a set of nodes that disconnects the network. The conflict at each node is modeled as a contest in which the player that allocates the higher level of force wins the node. Although there are multiple mixed-strategy equilibria, we characterize correlation structures in the players' multivariate joint distributions of force across nodes that arise in all equilibria. For example, in all equilibria the attacker utilizes a stochastic 'guerrilla warfare' strategy in which a single random [minimal] set of nodes that disconnects the network is attacked. JEL Classification: C7, D74
2011
With the rapid increase of technology throughout the world, there has also been an equally rapid increases in its abuse. Currently, security professional made some attempts to learn about attacker, however these attempts were limited in effort and scope. They emphasis on the targeted vulnerability and how the exploit took advantage of that vulnerability. However, very little attention was focused on the attackers themselves. IT is necessary to study the black-hat community’s tools, tactics, and motive and then sharing any lessons learned. The more you know about your enemies, the better chance you have of defending yourself against them and defeating them. A honeynet is a network set up with intentional vulnerabilities; its purpose is to invite attack, so that an attacker’s activities and methods can be studied and that information used to increase network security. This paper will collect and analyse the attackers activity, through the honeynet network and normal secured system and...
2004
benefiting from the experience and ideas of those who have come before me. I'd like to thank my family-Greg, Denise, Adam, and Allison-for all of their love and support. My friends all across the country have consistently been a source of ideas, inspiration, and (not least) fun, which has really made the past few years happy and worthwhile. Thanks Kate,
Proceedings of IEEE Workshop on Information Assurance and Security, 2000
Most literature on network modeling takes a functional perspective. That is, it models the network based on the needs the network must serve. As information assurance has risen as a functional need, the network models have added the need for a protective stance. In almost all instances, such a stance has been defined in terms of firewalls. As cyberspace becomes the next sphere of warfare, we must relook networks in terms of the principles of war. No matter how robust the firewall, it is basically a defensive measure, ...
2008
Abstract: In this paper we explore the need to structure human and organizational behaviour in ways that would support and enable the ideals inherent in the concept of Network Enabled Defence (NED). We suggest that NED takes place within a particular social (human and organizational) context, which serves as an enabler for NED.
2007
This article shows how policy choices about defense and attack investments at the component level can be made for arbitrarily complex networks and systems. Components can be in series, parallel, interdependent, interlinked, independent, or combinations of these. Investments and utilities are determined for the defender and attacker dependent on their unit costs of investment and contest intensity for each component, and their evaluations of the value of system functionality.
2015
collaborative visualization where very high-end video transfers are used in oil exploration, or designing automobiles, etc. Further details of ITU-T security guidelines, other related matters are in [6]. 3. The Context of Security and the Threat-Scape in Cyber Warfare The bulk of this segment of the chapter and what follows it to the end of the chapter is taken from an ongoing research work at the School of Engineering, Design and Technology, University of Bradford.[7] It will cover security concepts, security engineering in context, a brief overview of cryptology(cryptography, cryptanalysis), social engineering, Distributed Denial of Service (DDoS) attack, IP Trace-back mechanism and the threat-scape in cyber warfare. This segment will be closed with some deductions.
2011
The nature of computer network attacks raises many interesting dilemmas for modern armed forces, not least of which involve the principle of distinction and the permissible targets of attack. As a general proposition, it is prohibited to direct computer network attacks against civilian objects in the same manner that a conventional attack would be prohibited. Thus attacks against oil pipelines, civilian air traffic control or rail networks, emergency response networks, financial institutions and other civilian objects are prohibited. However, computer network attacks raise two particular issues for the law of targeting. 1 First, computer network attacks do not necessarily result in physical damage, death or injury, thus opening a range of possible targets for attack which might otherwise be unreachable because traditional means would cause excessive collateral damage. A second and related point is that computer network attacks can be designed to result in a range of outcomes, allowing the attacker to merely disable or neutralise a particular target without causing permanent damage or destruction. Such computer network operations may not even rise to the level of an attack at all.
This paper is all about the network security, how to save your network from various type of attack. I am very thankful to all my friends and teacher who help me to write this kind of article
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2023
How robust are our networks and systems, 2023
Computing Research Repository, 2010
Computer Engineering and Intelligent Systems, 2023