Network Security Scoring

被引:0
|
作者
Kacar, Mustafa Sami [1 ]
Oztoprak, Kamm [1 ]
机构
[1] KTO Karatay Univ, Dept Comp Engn, TR-42020 Konya, Turkey
关键词
network security; security scoring; Network user analyzing; Network component analyzing;
D O I
10.1109/ICSC.2017.86
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network Security is one of the most critical issues of establishments like universities, public and private enterprises which have significant role on operations and security of a state. These enterprises use Internet to share and keep official information, and to make their corporate operations. A cyber attack that targeted such establishments networks may cause a great loss. Therefore, networks of these enterprises ought to be protected on a high level security. In this paper, a system is offered which is able to investigate networks of enterprises and ranking their network by predefined parameters. Moreover Network Security Simulator is also offered to implement the system.
引用
收藏
页码:477 / 481
页数:5
相关论文
共 50 条
  • [1] Defining Network Exposure Metrics in Security Risk Scoring Models
    Weintraub, Eli
    Cohen, Yuval
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (04) : 399 - 404
  • [2] Scoring security
    不详
    NUCLEAR ENGINEERING INTERNATIONAL, 2012, 57 (692): : 32 - 34
  • [3] Scoring Social Security Proposals
    Diamond, Peter
    JOURNAL OF ECONOMIC PERSPECTIVES, 2016, 30 (02): : 245 - 246
  • [4] SCORING MANUAL FOR SECURITY MOTIVE
    KURESHI, A
    INDIAN JOURNAL OF PSYCHOLOGY, 1972, 47 : 97 - &
  • [5] Scoring Social Security Proposals Response
    Kashin, Konstantin
    King, Gary
    Soneji, Samir
    JOURNAL OF ECONOMIC PERSPECTIVES, 2016, 30 (02): : 246 - 247
  • [6] Scoring recognizability of faces for security applications
    Bianco, Simone
    Ciocca, Gianluigi
    Guarnera, Giuseppe Claudio
    Scaggiante, Andrea
    Schettini, Raimondo
    IMAGE PROCESSING: MACHINE VISION APPLICATIONS VII, 2014, 9024
  • [7] Network Security Node-Edge Scoring System Using Attack Graph Based on Vulnerability Correlation
    Shin, Gun-Yoon
    Hong, Sung-Sam
    Lee, Jung-Sik
    Han, In-Sung
    Kim, Hwa-Kyung
    Oh, Haeng-Rok
    APPLIED SCIENCES-BASEL, 2022, 12 (14):
  • [8] Security Risk Scoring Incorporating Computers' Environment
    Weintraub, Eli
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (04) : 183 - 189
  • [9] Simulating and Scoring the Traffic Efficiency of Airport Security
    Gong, Jinxin
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, INFORMATION AND COMPUTER SCIENCE (ICEMC 2017), 2017, 73 : 721 - 724
  • [10] Network Security
    Chen, Thomas M.
    IEEE NETWORK, 2009, 23 (05): : 2 - 3