Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints.

Autor: Lin, Frank Yeong-Sung, Wang, Yu-Shun, Wu, Yu-Pu, Hsu, Chia-Yang
Zdroj: 2012 26th International Conference on Advanced Information Networking & Applications Workshops; 1/ 1/2012, p165-170, 6p
Abstrakt: How to apply timely and effective defense strategies against attackers while maximizing system survivability is a critical issue for a defender. This paper mathematically models attack and defense scenarios, using various defensive mechanisms during both the planning and defending stages and under quality of service constraints. This model incorporates high degrees of randomness, as attackers are assumed to have incomplete information. Given such non-deterministic problems, this paper identifies the appropriate time for applying defense in depth or resource concentration strategy. [ABSTRACT FROM PUBLISHER]
Databáze: Complementary Index