Evaluation of computer network security using attack undirected geography

1Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.

Abstract

To secure a wealth of data traversing the computer network at your fingertips is compulsory. But when attack arises at various parts of the network it is difficult to protect, especially when each incident is investigated separately. Geography is a necessary construct in computer networks. The analytics of geography algorithms and metrics to curate insight from a security problem are a critical method of analysis for computer systems. A geography based representation is employed to highlight aspects (on a local and global level) of a security problem which are Eigenvalue, eccentricity, clustering coefficient and cliques. Network security model based on attack undirected geography (AUG) is familiarized. First, analysis based upon association rules is presented then the attack threshold value is set from AUG. The probability of an individual attack edge and associated network nodes are computed in order to quantify the security threat. The simulation is exploited to validate that results are effective.

Cite

CITATION STYLE

APA

Jittawiriyanukoon, C. (2019). Evaluation of computer network security using attack undirected geography. Indonesian Journal of Electrical Engineering and Computer Science, 16(3), 1508–1514. https://doi.org/10.11591/ijeecs.v16.i3.pp1508-1514

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free