Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs.
Wei LiRayford B. VaughnPublished in: CCGRID (2006)
Keyphrases
- network management
- security threats
- dynamic networks
- security issues
- enterprise network
- access control
- wireless sensor networks
- densely connected
- fully connected
- information security
- peer to peer
- network monitoring
- network structure
- communication networks
- security protection
- virtual private network
- network connection
- clustering algorithm
- security measures
- network layer
- network services
- cyber attacks
- real world networks
- network traffic
- security policies
- network security
- intrusion detection
- directed graph
- spanning tree
- network model
- internet service providers
- data points
- weighted graph
- bipartite graph
- link prediction
- intrusion detection and prevention