2023
DOI: 10.3991/ijoe.v19i07.39285
|View full text |Cite
|
Sign up to set email alerts
|

A Weighting Model of Cybersecurity Parameters Used for Service Placement

Abstract: Most cybersecurity frameworks are based on three major components such as confidentiality, integrity, and availability. All these components have their parameters that are used to secure network nodes. But finding the most cyber secure node in a network needs a measurement method. The aim of the paper is to offer a model that can be used to find the most secure network nodes considering these cybersecurity components and their parameters. This is achieved by modelling numeric values of respective weights for p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 10 publications
0
0
0
Order By: Relevance
“…However, there has been limited discussion regarding the practical implementation of at-a-point detection in various applications. Therefore, building upon prior effective implementations of intrusion detection systems (IDSs) [4][5][6][7][8] in the field of network security and inspired by the research efforts of [7,19,22], this study introduces methodologies for investigating the application of detection in store-and-forward operations, specifically in the context of transmission sessions. The research of previously published scholarly works on techniques for detecting IP packet header changes demonstrates a wide array of approaches.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, there has been limited discussion regarding the practical implementation of at-a-point detection in various applications. Therefore, building upon prior effective implementations of intrusion detection systems (IDSs) [4][5][6][7][8] in the field of network security and inspired by the research efforts of [7,19,22], this study introduces methodologies for investigating the application of detection in store-and-forward operations, specifically in the context of transmission sessions. The research of previously published scholarly works on techniques for detecting IP packet header changes demonstrates a wide array of approaches.…”
Section: Related Workmentioning
confidence: 99%
“…Malicious hackers may deploy various types of attacks, such as distributed denial-of-service (DDoS) or the port scan and infiltration attack, to hijack valuable data or make servers unavailable to users. This requires careful consideration of data security and integrity as companies must assure the data confidentiality, integrity, and availability, which means the data must be appropriately kept, managed, and maintained to prevent illegal access [5]. Several technological solutions have been introduced to reduce the problem, including the use of encryption, authentication systems, antivirus, firewalls, and intrusion detection systems (commonly known as IDSs) [6].…”
Section: Introductionmentioning
confidence: 99%