network security research paper-13



Network security evaluation through attack graph generation
FREE DOWNLOAD (PDF) 
Z Lufeng, T Hong, C YiMing ,World Academy of Science, , 2009 ,waset.ac.nz
Abstract—In today’s network, security evaluation is a challenging task for most of the
administrators. The typical means by which an attacker breaks into a network is through a
series of exploits, where each exploit in the series satisfies the precondition for 

Improving Network Security Using Ntop
FREE DOWNLOAD (PDF) 
L Deri ,Proc. Third International Workshop on the , 2000 ,raid-symposium.org
Almost every new company that connects to the Internet installs a firewall to protect company
assets hence prevent unauthorised access to its private network. Despite this general goal,
many network administrators decided to improve network security by adding a network-

Network Security Evaluation based on Simulation of Malefactor’s Behavior
FREE DOWNLOAD (PDF) 
IV Kotenko ,Proc. of the Intern. Conf. on Security , 2006 ,stepashkin.com
Abstract: The approach to computer network security analysis intended for using both at
design and exploitation stages is suggested. This approach is based on simulation of
malefactor’s behavior, generating common attack graphs and calculating different security

Assessing power substation network security and survivability: a work in progress report
FREE DOWNLOAD (PDF) 
C Taylor, P Oman , Conference on Security and , 2003 ,cs-snake.cs.uidaho.edu
Abstract This paper reports our experiences with identifying cyber-based threats to the
survivability of power substation control networks. Observations from the initial application of
vulnerability and hardening assessment techniques have been presented. The paper also 

A scalable, ordered scenario-based network security simulator
FREE DOWNLOAD (PDF) 
J Yun, E Park, E Im ,Systems Modeling and Simulation: Theory and , 2005 ,Springer
A network security simulator becomes more useful for the study on the cyber incidents and
their defense mechanisms, as cyber terrors have been increasingly popular. Until now,
network security simulations aim at damage estimation of incidents in small-size networks 

Network security framework
FREE DOWNLOAD (PDF) 
KKGB Nath ,IJCSNS, 2006 ,ww2.cs.mu.oz.au
Summary In this paper we present a general framework for an Intrusion Detection System
which we call as the Layer Based Intrusion Detection System (LBIDS). We base our
framework on the fact that any network needs to ensure the confidentiality, integrity and 

Modelling and analysing network security policies in a given vulnerability setting
FREE DOWNLOAD (PDF) 
R Rieke ,Critical Information Infrastructures Security, 2006 ,Springer
The systematic protection of critical information infrastructures requires an analytical process
to identify the critical components and their interplay, to determine the threats and
vulnerabilities, to assess the risks and to prioritise countermeasures where risk is 

Testing Network Security Using OPNET
FREE DOWNLOAD (PDF) 
A Zaballos, G Corral, I Serra ,OPNETWORK Proceeding, 2003 ,users.salleurl.edu
Abstract Network security nowadays has become a major priority for both network design
and implementation. Due to this fact, the interest in making network communications secure
has increased at the same rate as the accessibility to Internet services.

A decentralized Bayesian attack detection algorithm for network security
FREE DOWNLOAD (PDF) 
K Nguyen,   11 23 rd International Information Security , 2008 ,Springer
Decentralized detection has been an active area of research since the late 1970s. Its earlier
application area has been distributed radar systems, and more recently it has found
applications in sensor networks and intrusion detection. The most popular decentralized 

High performance pattern matching algorithm for network security
FREE DOWNLOAD (PDF) 
Y Wang ,IJCSNS, 2006 ,paper.ijcsns.org
Summary Many network security applications rely on pattern matching to extract the threat
from network traffic. The increase in network speed and traffic may make existing algorithms
to become a performance bottleneck. Therefore, it is very necessary to develop faster and 

Teaching network security in a virtual learning environment
FREE DOWNLOAD (PDF) 
L Bergstrom, KJ Grahn ,Journal of , 2004 ,adksvod.library.nenu.edu.cn
Executive Summary This article presents a virtual course with the topic network security. The
course has been produced by Arcada Polytechnic as a part of the production team
Computer Networks, Telecommunication and Telecommunication Systems in the Finnish 

Cert system and network security practices
FREE DOWNLOAD (PDF) 
JH Allen , for Information Systems Security Education (NCISSE’01 , 2001 ,hackerproof.org
Abstract: Networks have become indispensable for conducting business in government,
commercial, and academic organizations. Networked systems allow you to access needed
information rapidly, improve communications while reducing their cost, collaborate with 

Expressing and enforcing flow-based network security policies
FREE DOWNLOAD (PDF) 
T Hinrichs, N Gude, M Casado , of Chicago, Tech. , 2008 ,people.cs.uchicago.edu
Abstract While traditional network security policies have been enforced by manual
configuration of individual network components such as router ACLs, firewalls, NATs and
VLANs, emerging enterprise network designs and products support global policies 

Game theory meets network security and privacy
FREE DOWNLOAD (PDF) 
Q Zhu,   ACM Computing , 2011 ,netfiles.uiuc.edu
This survey provides a structured and comprehensive overview of research on security and
privacy in computer and communication networks that uses game-theoretic approaches. We
present a selected set of works to highlight the application of game theory in addressing 

Cooperative security for network coding file distribution
FREE DOWNLOAD (PDF) 
IEEE INFOCOM, 2006 ,research.microsoft.com
Abstract—Peer-to-peer content distribution networks can suffer from malicious participants
that intentionally corrupt content. Traditional systems verify blocks with traditional
cryptographic signatures and hashes. However, these techniques do not apply well to 

Requirements for plan recognition in network security systems
FREE DOWNLOAD (PDF) 
C Geib ,Proc. Int. Symp. on Recent Advances , 2002 ,homepages.inf.ed.ac.uk
Abstract. Computer network security systems need to incorporate artificial intelligence
methods for plan recognition. Plan recognition is critical both to predicting the future actions
of attackers and planning appropriate responses to their actions. This paper presents an 

HIMUTSIS: Hierarchical multi-tier adaptive ad-hoc network security protocol based on signcryption type key exchange schemes
FREE DOWNLOAD (PDF) 
A Yavuz, F Alagoz ,Computer and Information Sciences–ISCIS , 2006 ,Springer
Mobile Ad-hoc networks (MANETs), providing infrastructure-free wireless instant
communication, play important role in tactical military networks. However, providing security
in tactical military MANETs, having very large and dynamic structure without infrastructure 

Visualization of host behavior for network security
FREE DOWNLOAD (PDF) 
F Mansman, L Meier ,VizSEC 2007, 2008 ,Springer
Monitoring host behavior in a network is one of the most essential tasks in the fields of
network monitoring and security since more and more malicious code in the wild internet
constantly threatens the network infrastructure. In this paper, we present a visual analytics 

Network intrusion detection systems: Important ids network security vulnerabilities
FREE DOWNLOAD (PDF) 
S Edwards ,white paper Top Layer Networks, Inc. , 2002 ,1st-computer-networks.co.uk
Executive Summary The Network-based Intrusion Detection System (nIDS) has become a
critical component of an organization’s security strategy. However, deployment of network-
based intrusion detection brings with it a number of potential pitfalls, which can 

A Brief History of Network Security and the Need for Adherence to the Software Process Model
FREE DOWNLOAD (PDF) 
P Innella ,Retrieved December, 2008 ,64.107.8.176
Security on the Internet and on Local Area Networks is now at the forefront of computer
related issues. The technical jargon of the day is information warfare and network security,
and there are valid reasons for their rise in importance. Throughout the evolution of 

A test calculus framework applied to network security policies
FREE DOWNLOAD (PDF) 
JC Fernandez, L Mounier ,Formal Approaches to , 2006 ,Springer
We propose a syntax-driven test generation technique to automaticaly derive abstract test
cases from a set of requirements expressed in a linear temporal logic. Assuming that an
elementary test case (called a “tile”) is associated to each basic predicate of the formula, 

A Stochastic game nets based approach for network security analysis
FREE DOWNLOAD (PDF) 
C Lin, Y Wang ,Proc. of the 29th International Conference on , 2008 ,cs.ncl.ac.uk
Abstract. In this paper, we propose a novel modeling method, Stochastic Game Nets (SGN),
whose definition and some useful properties are given. The Stochastic Game Nets are
indicated to be effective in the field of network security. We apply the Stochastic Game 

Analysis of peer-to-peer network security using gnutella
FREE DOWNLOAD (PDF) 
D DeFigueiredo, A Garcia ,Department of Computer , 2002 ,eecs.berkeley.edu
Abstract Peer-to-peer (P2P) networks have emerged over the past several years as new and
effective ways for distributed resources to communicate and cooperate.” Peer-to-peer
computing is the sharing of computer resources and services by direct exchange between 


CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER