Network Security Architecture Based on Vulnerability Evaluation

被引:0
|
作者
Li, June [1 ]
Wang, Tongqing [1 ]
Zhou, Dongru
机构
[1] Wuhan Univ, Ctr Comp, Wuhan 430072, Peoples R China
关键词
Network security architecture; Vulnerabilities; Security of network infrastructure; Algebra method;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, after discussing the problems existed in the field of computer network security architecture, it is pointed out that vulnerabilities in the network system are the main factors from which the attacks result, and a model of network security architecture based on vulnerabilities evaluation (NSAonVE) is proposed. The NSAonVE researched the entities, the vulnerabilities of the entities and their characteristics and relations, and the concept of network security architecture used in this paper is defined. It is proved also that the network system can achieve the relative security status through reconstructing network topology. The NSAonVE is described in algebra method.
引用
收藏
页码:104 / 109
页数:6
相关论文
共 50 条
  • [1] Vulnerability Evaluation of Security Network Based on Neyman-Pearson Criterion
    Lv, Haitao
    Hu, Ruimin
    Chen, Jun
    [J]. PROCEEDINGS OF THE 2015 AASRI INTERNATIONAL CONFERENCE ON CIRCUITS AND SYSTEMS (CAS 2015), 2015, 9 : 279 - 282
  • [2] Router architecture evaluation for security network
    Yungho Choi
    Lark-Kyo Kim
    Hyungkeun Ahn
    Neungsoo Park
    [J]. Peer-to-Peer Networking and Applications, 2014, 7 : 628 - 635
  • [3] Router architecture evaluation for security network
    Choi, Yungho
    Kim, Lark-Kyo
    Ahn, Hyungkeun
    Park, Neungsoo
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2014, 7 (04) : 628 - 635
  • [4] An implementation of vulnerability evaluation system for network security on CC
    Kim, JG
    Lee, YC
    Lee, JK
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 1091 - 1095
  • [5] An evaluation of videogame network architecture performance and security
    Bryant, Blake
    Saiedian, Hossein
    [J]. COMPUTER NETWORKS, 2021, 192
  • [6] NETWORK SECURITY AND VULNERABILITY
    NYE, JM
    [J]. AFIPS CONFERENCE PROCEEDINGS, 1983, 52 : 647 - &
  • [7] Evaluation of Security Vulnerability Severity Based on CMAHP
    Song, Jialiang
    Han, Jihong
    Zhang, Danlin
    Yuan, Lin
    Shao, Lulu
    [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1056 - 1060
  • [8] Architecture Security Evaluation Method based on Security of the Components
    Du, Changxiao
    Li, Xiaohong
    Shi, Hong
    Hu, Jing
    Feng, Ruitao
    Feng, Zhiyong
    [J]. 2013 20TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2013), VOL 1, 2013, : 523 - 528
  • [9] Network Evaluation Based on Connectivity Vulnerability
    Kurauchi, Fumitaka
    Uno, Nobuhiro
    Sumalee, Agachai
    Seto, Yumiko
    [J]. TRANSPORTATION AND TRAFFIC THEORY 2009: GOLDEN JUBILEE, 2009, : 637 - +
  • [10] Evaluation of a Massively Parallel Architecture for Network Security Applications
    Mason, Blake C.
    Ghosal, Dipak
    Corbett, Cherita
    [J]. PROCEEDINGS OF THE 18TH EUROMICRO CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING, 2010, : 85 - 91