Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology - CSTST '08 2008
DOI: 10.1145/1456223.1456239
|View full text |Cite
|
Sign up to set email alerts
|

Network security simulation and evaluation

Abstract: In this paper, we propose an approach of analyzing and evaluating network security based on simulation. It can provide measurable data to help improving network security by simulating various cyber attacks and calculating the security loss of the network to estimate the impacts of the attacks. Firstly, the basic method of evaluation and formulae of calculating security loss are proposed, and then the simulation models and the simulation system which has been implemented are introduced.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2011
2011
2012
2012

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Information security audits provide a degree of assurance to management, customers, and other third parties giving due consideration to information security issues. Hence, accurate modeling and simulation of networks and information security evaluations are important issues. To have an overall picture of an entire network environment, often modern simulation tools are needed.…”
Section: Related Workmentioning
confidence: 99%
“…Information security audits provide a degree of assurance to management, customers, and other third parties giving due consideration to information security issues. Hence, accurate modeling and simulation of networks and information security evaluations are important issues. To have an overall picture of an entire network environment, often modern simulation tools are needed.…”
Section: Related Workmentioning
confidence: 99%