Paper Title:
Network Security Situation Analysis Aimed at Distributed Attack
  Abstract

When a certain distributed attack spreads in network, network hosts are classified into three types. The first type has undergone the distributed attack. The second type has the attacked likelihood. The third type is immune to the distributed attack. Distributed attack will cause congested links in network usually. Network security situation of distributed attack can be determined by attack severity degree of hosts and congestion condition of network. The paper analyzes distributed attack spread and builds an attack graph. The attack graph is used to reflect attacked status of hosts and congestion degree of network. Network security situation is deduced based on the graph.

  Info
Periodical
Advanced Materials Research (Volumes 179-180)
Edited by
Garry Zhu
Pages
1005-1010
DOI
10.4028/www.scientific.net/AMR.179-180.1005
Citation
Y. M. Fu, W. Chen, L. Li, Y. X. Pan, "Network Security Situation Analysis Aimed at Distributed Attack", Advanced Materials Research, Vols. 179-180, pp. 1005-1010, 2011
Online since
January 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Xin Hai Wang
Abstract:Application Layer Multicast (ALM) is more flexible than that in IP layer and easy to optimize for specific applications, so the research on...
46
Authors: Rui Rui Zhang, Xin Xiao
Chapter 6: Advanced Construction Materials
Abstract:Network security situation awareness is a new technology for network security monitoring and early warning, and is a hot spot in the area of...
1218
Authors: Rui Huang, Jun Feng Wan
Chapter 4: Data Processing and Applied Computational Methods and Algorithms
Abstract:The switch is applied into topology discovery areas has become a hot research topic in network management technology. Through summarizing...
3952
Authors: Yu Lin Wang, Jin Heng Wang
Chapter 7: Communication and Information Technologies, Algorithms and Numerical Methods of Data Processing
Abstract:With the development of Internet virtual network , In the network environment , a variety of pathways and complex application environments...
1792