A note on measurement of network vulnerability under random and intentional attacks
A. YazdaniPaul JeffreyPublished in: CoRR (2010)
Keyphrases
- buffer overflow
- traffic analysis
- security risks
- peer to peer
- chosen plaintext
- attack graphs
- network traffic
- denial of service
- network anomaly detection
- wireless sensor networks
- denial of service attacks
- security threats
- dos attacks
- measurement data
- neural network
- countermeasures
- network model
- communication networks
- complex networks
- network structure
- social networks
- security mechanisms
- mental states
- network intrusion
- attack graph
- fault injection
- network administrators
- intrusion detection