network security research paper-13

Network security evaluation through attack graph generation
Z Lufeng, T Hong, C YiMing ,World Academy of Science, , 2009 ,
Abstract—In today’s network, security evaluation is a challenging task for most of the
administrators. The typical means by which an attacker breaks into a network is through a
series of exploits, where each exploit in the series satisfies the precondition for 

Improving Network Security Using Ntop
L Deri ,Proc. Third International Workshop on the , 2000 ,
Almost every new company that connects to the Internet installs a firewall to protect company
assets hence prevent unauthorised access to its private network. Despite this general goal,
many network administrators decided to improve network security by adding a network-

Network Security Evaluation based on Simulation of Malefactor’s Behavior
IV Kotenko ,Proc. of the Intern. Conf. on Security , 2006 ,
Abstract: The approach to computer network security analysis intended for using both at
design and exploitation stages is suggested. This approach is based on simulation of
malefactor’s behavior, generating common attack graphs and calculating different security

Assessing power substation network security and survivability: a work in progress report
C Taylor, P Oman , Conference on Security and , 2003 ,
Abstract This paper reports our experiences with identifying cyber-based threats to the
survivability of power substation control networks. Observations from the initial application of
vulnerability and hardening assessment techniques have been presented. The paper also 

A scalable, ordered scenario-based network security simulator
J Yun, E Park, E Im ,Systems Modeling and Simulation: Theory and , 2005 ,Springer
A network security simulator becomes more useful for the study on the cyber incidents and
their defense mechanisms, as cyber terrors have been increasingly popular. Until now,
network security simulations aim at damage estimation of incidents in small-size networks 

Network security framework
KKGB Nath ,IJCSNS, 2006 ,
Summary In this paper we present a general framework for an Intrusion Detection System
which we call as the Layer Based Intrusion Detection System (LBIDS). We base our
framework on the fact that any network needs to ensure the confidentiality, integrity and 

Modelling and analysing network security policies in a given vulnerability setting
R Rieke ,Critical Information Infrastructures Security, 2006 ,Springer
The systematic protection of critical information infrastructures requires an analytical process
to identify the critical components and their interplay, to determine the threats and
vulnerabilities, to assess the risks and to prioritise countermeasures where risk is 

Testing Network Security Using OPNET
A Zaballos, G Corral, I Serra ,OPNETWORK Proceeding, 2003 ,
Abstract Network security nowadays has become a major priority for both network design
and implementation. Due to this fact, the interest in making network communications secure
has increased at the same rate as the accessibility to Internet services.

A decentralized Bayesian attack detection algorithm for network security
K Nguyen,   11 23 rd International Information Security , 2008 ,Springer
Decentralized detection has been an active area of research since the late 1970s. Its earlier
application area has been distributed radar systems, and more recently it has found
applications in sensor networks and intrusion detection. The most popular decentralized 

High performance pattern matching algorithm for network security
Y Wang ,IJCSNS, 2006 ,
Summary Many network security applications rely on pattern matching to extract the threat
from network traffic. The increase in network speed and traffic may make existing algorithms
to become a performance bottleneck. Therefore, it is very necessary to develop faster and 

Teaching network security in a virtual learning environment
L Bergstrom, KJ Grahn ,Journal of , 2004 ,
Executive Summary This article presents a virtual course with the topic network security. The
course has been produced by Arcada Polytechnic as a part of the production team
Computer Networks, Telecommunication and Telecommunication Systems in the Finnish 

Cert system and network security practices
JH Allen , for Information Systems Security Education (NCISSE’01 , 2001 ,
Abstract: Networks have become indispensable for conducting business in government,
commercial, and academic organizations. Networked systems allow you to access needed
information rapidly, improve communications while reducing their cost, collaborate with 

Expressing and enforcing flow-based network security policies
T Hinrichs, N Gude, M Casado , of Chicago, Tech. , 2008 ,
Abstract While traditional network security policies have been enforced by manual
configuration of individual network components such as router ACLs, firewalls, NATs and
VLANs, emerging enterprise network designs and products support global policies 

Game theory meets network security and privacy
Q Zhu,   ACM Computing , 2011 ,
This survey provides a structured and comprehensive overview of research on security and
privacy in computer and communication networks that uses game-theoretic approaches. We
present a selected set of works to highlight the application of game theory in addressing 

Cooperative security for network coding file distribution
Abstract—Peer-to-peer content distribution networks can suffer from malicious participants
that intentionally corrupt content. Traditional systems verify blocks with traditional
cryptographic signatures and hashes. However, these techniques do not apply well to 

Requirements for plan recognition in network security systems
C Geib ,Proc. Int. Symp. on Recent Advances , 2002 ,
Abstract. Computer network security systems need to incorporate artificial intelligence
methods for plan recognition. Plan recognition is critical both to predicting the future actions
of attackers and planning appropriate responses to their actions. This paper presents an 

HIMUTSIS: Hierarchical multi-tier adaptive ad-hoc network security protocol based on signcryption type key exchange schemes
A Yavuz, F Alagoz ,Computer and Information Sciences–ISCIS , 2006 ,Springer
Mobile Ad-hoc networks (MANETs), providing infrastructure-free wireless instant
communication, play important role in tactical military networks. However, providing security
in tactical military MANETs, having very large and dynamic structure without infrastructure 

Visualization of host behavior for network security
F Mansman, L Meier ,VizSEC 2007, 2008 ,Springer
Monitoring host behavior in a network is one of the most essential tasks in the fields of
network monitoring and security since more and more malicious code in the wild internet
constantly threatens the network infrastructure. In this paper, we present a visual analytics 

Network intrusion detection systems: Important ids network security vulnerabilities
S Edwards ,white paper Top Layer Networks, Inc. , 2002 ,
Executive Summary The Network-based Intrusion Detection System (nIDS) has become a
critical component of an organization’s security strategy. However, deployment of network-
based intrusion detection brings with it a number of potential pitfalls, which can 

A Brief History of Network Security and the Need for Adherence to the Software Process Model
P Innella ,Retrieved December, 2008 ,
Security on the Internet and on Local Area Networks is now at the forefront of computer
related issues. The technical jargon of the day is information warfare and network security,
and there are valid reasons for their rise in importance. Throughout the evolution of 

A test calculus framework applied to network security policies
JC Fernandez, L Mounier ,Formal Approaches to , 2006 ,Springer
We propose a syntax-driven test generation technique to automaticaly derive abstract test
cases from a set of requirements expressed in a linear temporal logic. Assuming that an
elementary test case (called a “tile”) is associated to each basic predicate of the formula, 

A Stochastic game nets based approach for network security analysis
C Lin, Y Wang ,Proc. of the 29th International Conference on , 2008 ,
Abstract. In this paper, we propose a novel modeling method, Stochastic Game Nets (SGN),
whose definition and some useful properties are given. The Stochastic Game Nets are
indicated to be effective in the field of network security. We apply the Stochastic Game 

Analysis of peer-to-peer network security using gnutella
D DeFigueiredo, A Garcia ,Department of Computer , 2002 ,
Abstract Peer-to-peer (P2P) networks have emerged over the past several years as new and
effective ways for distributed resources to communicate and cooperate.” Peer-to-peer
computing is the sharing of computer resources and services by direct exchange between 

- -