Research on Attack Model for Cognitive Network based on Scientific Analysis of Network Material System

被引:0
|
作者
Sun, Yan [1 ]
Zhou, XueGuang [1 ]
机构
[1] Naval Univ Engn, Coll Elect Engn, Wuhan 430033, Hubei, Peoples R China
关键词
Network security; computer security; cognitive Network; attack model;
D O I
10.4028/www.scientific.net/AMM.63-64.911
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cognitive attacks, which influence the user's perceptions and behavior, are more serious than physical or even syntactic attacks. We construct an attack model for cognitive Network based on scientific analysis of Network material system to visualize cognitive attack. The cognitive attack model consists of two parts: attackers and netizens. We formalize each element of the model. The cognitive attack example analysis illustrates the rationality of the model.
引用
收藏
页码:911 / 914
页数:4
相关论文
共 50 条
  • [1] A survivability quantitative analysis model for network system based on attack graph
    Zhang, Le-Jun
    Wang, Wei
    Guo, Lin
    Yang, Wu
    Yang, Yong-Tian
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3211 - 3216
  • [2] Research on Network Attack Training Simulation System Based on Attack Tree
    Shen, Jianjun
    Yang, Jun
    Chen, Gang
    [J]. MATERIAL SCIENCE, CIVIL ENGINEERING AND ARCHITECTURE SCIENCE, MECHANICAL ENGINEERING AND MANUFACTURING TECHNOLOGY II, 2014, 651-653 : 1917 - +
  • [3] Research and experiments of network attack defence system
    Li, J
    Zhang, GY
    Gu, GC
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 3548 - 3553
  • [4] Research on Network Security Quantitative Model Based on Probabilistic Attack Graph
    Cui, Yimin
    Li, Junmei
    Zhao, Wei
    Luan, Cheng
    [J]. AMCSE 2018 - INTERNATIONAL CONFERENCE ON APPLIED MATHEMATICS, COMPUTATIONAL SCIENCE AND SYSTEMS ENGINEERING, 2019, 24
  • [5] Research on Defense Model and Detection of Abnormal Characteristics of Network Attack Based on
    Zhao, Xiu Mei
    [J]. FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY V, 2015, : 577 - 581
  • [6] Research on network attack situation niching model based on FNN theory
    Tao, Yuan
    Liu, Zengliang
    Zhang, Zhinan
    Wang, Panqing
    Guo, Chunxia
    [J]. Gaojishu Tongxin/Chinese High Technology Letters, 2010, 20 (07): : 680 - 684
  • [7] Analysis of computer network attack based on the virus propagation model
    He, Yanshan
    Wang, Ting
    Xie, Jianli
    Zhang, Ming
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [8] Analysis of computer network attack based on the virus propagation model
    Yanshan He
    Ting Wang
    Jianli Xie
    Ming Zhang
    [J]. EURASIP Journal on Wireless Communications and Networking, 2020
  • [9] Network security analysis model based on the increase in attack ability
    Zhang, Haixia
    Su, Purui
    Feng, Dengguo
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2007, 44 (12): : 2012 - 2019
  • [10] Complex Network Security Analysis based on Attack Graph Model
    Liu, Zhiming
    Li, Sheng
    He, Jin
    Xie, Di
    Deng, Zhantao
    [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 183 - 186