Self-adaptability and vulnerability assessment of secure autonomic communication networks

被引:0
|
作者
Chiang, Frank [1 ]
Braun, Robin [1 ]
机构
[1] Univ Technol Sydney, Fac Engn, Sydney, NSW 2007, Australia
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Risk and Vulnerability Analysis (RVA) aims at identifying the weaknesses of the networks that may be exploited to compromise the normal functions, such as service deployment, file system access permissions, applications activations and so on. Autonomic Communication Networks (ACNs) are recently proposed as business-objective driven high-level self-managed telecommunication networks with the adaptation capability to cope with increasing dynamics. Adaptation capability termed as adaptability becomes the premise of realizing thorough autonomy. As a theoretic foundation, we firstly propose an innovative Object-oriented Management Information Base (O:MIB). Secondly, a new in format ion- theoret ic security awareness strategy inspired from human immune system is proposed to reconfigure file access right, which has a direct relation with adaptability. The experimental results validate this methodology and find out a statistical bound for operators to set a vulnerability level of warning in practice.
引用
收藏
页码:112 / +
页数:2
相关论文
共 50 条
  • [21] VULNERABILITY OF COMMUNICATION NETWORKS
    FRANK, H
    [J]. IEEE TRANSACTIONS ON COMMUNICATION TECHNOLOGY, 1967, CO15 (06): : 778 - +
  • [22] Conjoint trust assessment for secure communication in cognitive radio networks
    Parvin, Sazia
    Hussain, Farookh Khadeer
    Hussain, Omar Khadeer
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (5-6) : 1340 - 1350
  • [23] Secure autonomic communication using RSA algorithm
    Chittala, Aarti
    Mummini, Preethi
    Verma, P. Suresh
    [J]. 2006 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, VOLS 1 AND 2, 2007, : 76 - 79
  • [24] A new approach towards the self-adaptability of Service-Oriented Architectures to the context based on workflow
    Felhi, Faical
    Akaichi, Jalel
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (12) : 1 - 6
  • [25] Enabling self-adaptability of small scale and large scale security systems using dynamic partial reconfiguration
    B. C. Manjith
    R. Dhanalakshmi
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 9387 - 9403
  • [26] A new meta-model approach for a self-adaptability of service-oriented architecture to the context
    Felhi, Faical
    Akaichi, Jalel
    [J]. 2014 WORLD SYMPOSIUM ON COMPUTER APPLICATIONS & RESEARCH (WSCAR), 2014,
  • [27] Self-Adaptability and Organization for Pervasive Computing and Sensor Network Environments using a Biologically-inspired Approach
    Sakhaee, Ehssan
    Wakamiya, Naoki
    Murata, Masayuki
    [J]. PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, 2008, : 892 - 895
  • [28] Toward Vulnerability Assessment for 5G Mobile Communication Networks
    Luo, Shibo
    Wu, Jun
    Li, Jianhua
    Guo, Longhua
    Pei, Bei
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SMART CITY/SOCIALCOM/SUSTAINCOM (SMARTCITY), 2015, : 72 - 76
  • [29] A secure and dependable trust assessment (SDTS) scheme for industrial communication networks
    Tayyab Khan
    Karan Singh
    Khaleel Ahmad
    Khairol Amali Bin Ahmad
    [J]. Scientific Reports, 13
  • [30] A secure and dependable trust assessment (SDTS) scheme for industrial communication networks
    Khan, Tayyab
    Singh, Karan
    Ahmad, Khaleel
    Bin Ahmad, Khairol Amali
    [J]. SCIENTIFIC REPORTS, 2023, 13 (01)