network security research paper-11

Introduction to network security
M Curtin ,Computer Based Learning Unit, University of Leeds. , 1997 ,
Abstract Network security is a complicated subject, historically only tackled by well-trained
and experienced experts. However, as more and more people become” wired”, an
increasing number of people need to understand the basics of security in a networked 

Generating network security protocol implementations from formal specifications
B Tobler , and Security in Inter-Organizational E- , 2005 ,Springer
We describe the Spi2Java code generation tool, which we have developed in an attempt to
bridge the gap between formal security protocol specification and executable
implementation. Implemented in Prolog, Spi2Java can input a formal security protocol 

Analysis of policy anomalies on distributed network security setups
F Cuppens ,Computer Security– , 2006 ,Springer
The use of different network security components, such as firewalls and network intrusion
detection systems (NIDSs), is the dominant method to survey and guarantee the security
policy in current corporate networks. On the one hand, firewalls are traditional security

A graph-theoretic network security game
M Mavronicolas, V Papadopoulou ,Internet and Network , 2005 ,Springer
Consider a network vulnerable to viral infection. The system security software can guarantee
safety only to a limited part of the network. We model this practical network scenario as a
non-cooperative multi-player game on a graph, with two kinds of players, a set of attackers 

An ontology for network security attacks
A Simmonds, P Sandilands ,Applied Computing, 2004 ,Springer
We first consider network security services and then review threats, vulnerabilities and
failure modes. This review is based on standard texts, using well-known concepts,
categorizations, and methods, eg risk analysis using asset-based threat profiles and 

Test generation for network security rules
V Darmaillacq, JC Fernandez, R Groz ,Testing of , 2006 ,Springer
Checking that a security policy has been correctly deployed over a network is a key issue for
system administrators. Since policies are usually expressed by rules, we propose a method
to derive tests from a set of rules with a single modality. For each element of our language 

security protocols based on elliptic curve cryptography
M Aydos, E Savas ,Proc. Fourth Symposium. Computer , 1999 ,
Abstract Elliptic curve cryptography provides a methodology for obtaining high-speed,
efficient, and scalable implementations of network security protocols. In this paper, we
describe in detail three protocols based on elliptic curve cryptographic techniques, and 

Attack graph based evaluation of network security
I Kotenko ,Communications and Multimedia Security, 2006 ,Springer
The perspective directions in evaluating network security are simulating possible
malefactor’s actions, building the representation of these actions as attack graphs (trees,
nets), the subsequent checking of various properties of these graphs, and determining 

A Knowledge-based approach to network security: applying Cyc in the domain of network risk assessment
CB Fraser ,PROCEEDINGS OF THE , 2005 ,
Abstract CycSecureTM is a network risk assessment and network monitoring application that
relies on knowledge-based artificial intelligence technologies to improve on traditional
network vulnerability assessment. CycSecure integrates public reports of software faults 

Multi-agent technologies for computer network security: Attack simulation, intrusion detection and intrusion detection learning
V Gorodetski, I Kotenko ,International Journal of , 2003 ,
This paper presents experience in application of multi-agent technology to design and
implementation of multi-agent systems (MASs) intended to cooperatively solve the currently
critical tasks in the area of computer network security assurance. These MASs are Agent-

Programming routers to improve network security
L Peluso , Generation Network , 2001 ,
• DDoS goal: jeopardize the availability of a service by wasting network and system
resources through the cooperation of a number of hosts spread on the Internet• Defence
techniques require the identification and isolation of attack sources• IP address spoofing 

Analyzing vulnerabilities and measuring security level at design and exploitation stages of computernetwork life cycle
I Kotenko ,Computer Network Security, 2005 ,Springer
Vulnerability detection and security level estimation are actual tasks of protecting computer
networks. The paper considers the models and architectures of intelligent components
intended for active analyzing computer network vulnerabilities and estimating its security

Misconfiguration management of network security components
F Cuppens, N Cuppens-Boulahia , , Network, and , 2005 ,
ABSTRACT Many companies and organizations use firewalls to control the access to their
network infrastructure. Firewalls are network security components which provide means to
filter traffic within corporate networks, as well as to police incoming and outcoming 

Wireless sensor network security analysis
HK Kalita , Journal of Next-Generation Networks (IJNGN), 2009 ,
ABSTRACT The emergence of sensor networks as one of the dominant technology trends in
the coming decades has posed numerous unique challenges to researchers. These
networks are likely to be composed of hundreds, and potentially thousands of tiny sensor 

Best practices in network security
Information systems security. Computer and network security. Internet security. It’s a complex
world, and growing more so every day. With these changes, some truths and approaches to
security remain the same, while others are new and radically different. Developing a 

- -