scholarly journals An Approach for Internal Network Security Metric Based on Attack Probability

2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Chun Shan ◽  
Benfu Jiang ◽  
Jingfeng Xue ◽  
Fang Guan ◽  
Na Xiao

A network security metric may provide quantifiable evidence to assist security practitioners in securing computer networks. However, research on security metrics based on attack graph is not applicable to the characteristics of internal attack; therefore we propose an internal network security metric method based on attack probability. Our approach has the following benefits: it provides the method of attack graph simplification with monitoring event node which could solve the attack graph exponential growth with the network size, while undermining the disguise of internal attacks and improving the efficiency of the entire method; the method of attack probability calculation based on simplified attack graph can simplify the complexity of internal attacks and improve the accuracy of the approach.

2014 ◽  
Vol 707 ◽  
pp. 458-461 ◽  
Author(s):  
Dong Ming Zhao ◽  
Kai Feng Zhu

Internet technology as the cutting-edge of the current information technology, it has penetrated into every aspect of human life, more and more government agencies, enterprises are using Internet to improve their office efficiency and to establish new business operation model, in order to improve its reaction ability in fierce competition. Internet has brought convenience for people to work, while the security problem of network also will follow. The internal network not only needs to ensure the security of their data, but also needs to exchange data with the external network, then by adopting network security isolation system which takes gatekeeper technology as its core technology, so that we can ensure that internal network and external network will have physical isolation at any time, meanwhile, according to business needs, it also has multiple forms of information and data’s exchanges.


Author(s):  
I. A. Almerhag

Even though it is an essential requirement of any computer system, there is not yet a standard method to measure data security, especially when sending information over a network. However, the most common technique used to achieve the three goals of security is encryption. Three security metrics are derived from important issues of network security in this chapter. Each metric demonstrates the level of achievement in preserving one of the security goals. Routing algorithms based on these metrics are implemented to test the proposed solution. Computational effort and blocking probability are used to assess the behavior and the performance of these routing algorithms. Results show that the algorithms are able to find feasible paths between communicating parties and make reasonable savings in the computational effort needed to find an acceptable path. Consequently, higher blocking probabilities are encountered, which is the price to be paid for such savings.


2018 ◽  
Vol 246 ◽  
pp. 03016
Author(s):  
Aidong Xu ◽  
Kai Fan ◽  
Hang Yang

With the rapid development of information technology construction in the power industry, research on network security has become a problem that cannot be ignored. This paper introduces the use of information communication network equipment at home and abroad in power system; analyzes the security risks of foreign network equipment in power system, shows the risk of power system network and the urgent need for localization of network equipment and analyzes the security of internal network of power system Risks; specific measures for the safety control of network equipment in the whole process are proposed to provide reference for power system network security protection.


Sign in / Sign up

Export Citation Format

Share Document