An Optical Bypass Switch for Network Protection

1987 ◽  
Author(s):  
Lauren F. Calaby
Author(s):  
G. I. Korshunov ◽  
V. A. Lipatnikov ◽  
A. A. Shevchenko ◽  
V. Y. Malyshev

Introduction:The known methods of adaptive management of information network protection with special security measures are not effective enough in modern conditions, as they only take into account collected and processed data on security events and do not analyze the dynamics of the actions.Purpose:Developing a method of adaptive control of information network protection based on the analysis of violator's actions.Results:A method has been proposed for adaptive management of information network protection. Unlike other known methods, it is based on analyzing the dynamics of the violator's actions and determining the situational confrontation parameters under stochastic uncertainty. The method includes situation monitoring, operational control of the sequence of violator's actions, modeling the attacker's strategy, determining the situational parameters with a reliable prediction of the intrusion strategy. During the analysis, the network administrator receives information about the priority purposes of an intruder, the tools used and the vulnerabilities of the network. This provides an opportunity to promptly take measures to increase the security of the network and avoid its compromise.Practical relevance: Тhis approach allows you to maintain the operation of automated management systems for an organization with integrated structure, taking into account the scaling in planning and making changes to the structure on the background of information confrontation at the required level when multiple threats are changing their dynamics. 


2019 ◽  
Vol 34 (1) ◽  
pp. 397-406 ◽  
Author(s):  
Philipp Ruffing ◽  
Nils Collath ◽  
Christina Brantl ◽  
Armin Schnettler

Author(s):  
Svitlana Shevchenko ◽  
Pavlo Skladannyi ◽  
Maksym Martseniuk

The article is devoted to the problem of information security, namely the study of the characteristics of antivirus programs which are standardized in Ukraine. The study used statistical methods to analyze the characteristics of antivirus software and comparative methods of comparing the various types of such programs. Relying on researches in scientific literature, the main threats to information security in the field of information technology were analyzed. The emphasis is placed on the fact that antivirus software is the most effective protection against malicious software (malware). The basic methods of work of the antivirus – signature and heuristic – are described. The list of standardized in Ukraine antivirus programs is determined. The study was based on the quantitative and qualitative results which while testing had obtained by the independent testing laboratory AV-Comparatives (Austria), the independent Virus Bulletin (VB) laboratory for testing and certification in the field of security, the Center for antivirus protection information of the State Special Communication Service of Ukraine. The comparative analysis of the main characteristics of antivirus programs was carried out, namely: antivirus and anti-spyware; anti-phishing; anti-rootkit protection against exploits; Intrusion Prevention System; Real-time protection; parental control; host-based firewall; antispam; protection against network attacks; home network protection; anti-theft; password management.


2014 ◽  
Vol 1 (1) ◽  
pp. 99-108 ◽  
Author(s):  
Victor M. Preciado ◽  
Michael Zargham ◽  
Chinwendu Enyioha ◽  
Ali Jadbabaie ◽  
George J. Pappas

2017 ◽  
Author(s):  
◽  
Gokhan Karakose

[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI AT REQUEST OF AUTHOR.] The identification of critical network components is of interest to both interdictors wishing to degrade the network's performance, and to defenders aiming to preserve network performance in the face of disruption. This dissertation focuses on methods for identifying critical subsets of nodes and/or arcs to fortify and/or disable for the purpose of network protection. A common link connecting all studies in this dissertation is our incorporation of the multi-commodity flow formulations into larger multi-level (e.g., minimax) optimization models. ... The last study examines network fortification models that are able to differentiate between failures that are random (e.g., caused by nature) and strategic network failures (e.g., caused by terrorist activities) when performing the allocation of protective resources. This distinction cannot be achieved in the models presented previously in this dissertation. The desired properties of such differentiating formulations are derived by specifying a set of priori assumptions. The criticality indexes in these models, which are necessary to assess the impact of a disruption, are pre-computed through the resolution of the multi-commodity based User Equilibrium (UE) traffic assignment model and applied to urban transportation networks. Novel valid inequalities and linearization techniques are applied to the dual version of the nonlinear UE multi-commodity model to improve its computational efficiency. Computational results demonstrate that the reformulated linear dual model is effective to solve large size instances to near-optimality; and that the optimal allocation of resources as identified by a component-based formulation may potentially be suboptimal when a network is at risk of multiple simultaneous failures for both types of disruptions (i.e., nature- and terrorist-based). We also demonstrate that fortification models for component or scenario-based disruptions can provide different resource allocations for both types of disruptions.


Sign in / Sign up

Export Citation Format

Share Document