TY - JOUR
T1 - Security analysis of compromised-neighbor-tolerant networks using stochastics
AU - Li, Xiaohu
AU - Li, Linxiong
PY - 2012
Y1 - 2012
N2 - A stochastic model is introduced to investigate the security of network systems based on their vulnerability graph abstractions. Instead of doing traditional security analysis, this paper employs the increasing convex order to study the underlying vulnerability graph. The results of this paper can provide an insight on designing a more secure system, as well as an insight on enhancing the security of an existing system.
AB - A stochastic model is introduced to investigate the security of network systems based on their vulnerability graph abstractions. Instead of doing traditional security analysis, this paper employs the increasing convex order to study the underlying vulnerability graph. The results of this paper can provide an insight on designing a more secure system, as well as an insight on enhancing the security of an existing system.
KW - Exponential distribution
KW - harmonic mean
KW - increasing convex order
KW - power law
KW - random graph
KW - stochastic order
UR - http://www.scopus.com/inward/record.url?scp=84865775542&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84865775542&partnerID=8YFLogxK
U2 - 10.1109/TR.2012.2206273
DO - 10.1109/TR.2012.2206273
M3 - Article
AN - SCOPUS:84865775542
SN - 0018-9529
VL - 61
SP - 749
EP - 757
JO - IEEE Transactions on Reliability
JF - IEEE Transactions on Reliability
IS - 3
M1 - 6236285
ER -