مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

138
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

95
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Seminar Paper

Title

A THREAT RISK ESTIMATION MODEL FOR COMPUTER NETWORK SECURITY

Pages

  -

Abstract

 RISK ANALYSIS OF SECURITY THREATS IN COMPUTER NETWORKS IS ONE OF THE MOST CHALLENGING FIELDS IN NETWORK MANAGEMENT. SECURITY RISK ANALYSIS IS USUALLY DONE BY SECURITY EXPERTS. ALTHOUGH THEY UTILIZE ANALYSIS TOOLS SUCH AS SCANNERS AND ANALYZERS, THE NEED FOR EXPERT IS STILL INEVITABLE. TO REDUCE THE NEED OF SECURITY EXPERTISE FOR NETWORK ADMINISTRATOR, YET PERFORMING SECURITY RISK MANAGEMENT, THIS PAPER PROPOSES UML MODELS TO REPRESENT EXPERT’S SECURITY INFORMATION. WE PROPOSE A UML CLASS DIAGRAM WHICH IS BUILT UP OF NECESSARY CLASSES FOR SECURITY ANALYSIS OF NETWORKS. THESE CLASSES ARE THE BUILDING BLOCKS NEEDED FOR ESTIMATION OF PROBABILITY AND EFFECTS OF SECURITY THREATS. THIS MODEL IS CREATED ONCE AND REPRESENTS THE SECURITY INFORMATION NEEDED FOR ANALYSIS. TO ANALYZE ANY NETWORK, THE NEEDED OBJECTS SHOULD BE INSTANTIATED FROM THE PROVIDED CLASSES. THESE OBJECTS FORM THE SECURITY MODEL OF THE NETWORK WITH ALL THE THREATS AND THEIR RISKS SPECIFIED IN. TO INSTANTIATE THE OBJECTS OF NETWORK SECURITY MODEL, ITS INFORMATION IS NEEDED. THIS INFORMATION IS USUALLY AVAILABLE IN DOCUMENTS OF A NETWORK OR IS OBTAINABLE VIA AUTOMATED SCANNERS. WE SHOW THE APPLICABILITY OF THE PROPOSED MODEL ON A TEST NETWORK. AS THE RESULT, THE SECURITY MODEL OF THE NETWORK WHICH CONTAINS ITS SECURITY THREATS AND ALSO THEIR RISKS ARE OBTAINED.

Multimedia

  • No record.
  • Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    Rezaee, Razieh, GHAEMI BAFGHI, ABBAS, & Khosravi Farmad, Masoud. (2016). A THREAT RISK ESTIMATION MODEL FOR COMPUTER NETWORK SECURITY. INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE). SID. https://sid.ir/paper/944568/en

    Vancouver: Copy

    Rezaee Razieh, GHAEMI BAFGHI ABBAS, Khosravi Farmad Masoud. A THREAT RISK ESTIMATION MODEL FOR COMPUTER NETWORK SECURITY. 2016. Available from: https://sid.ir/paper/944568/en

    IEEE: Copy

    Razieh Rezaee, ABBAS GHAEMI BAFGHI, and Masoud Khosravi Farmad, “A THREAT RISK ESTIMATION MODEL FOR COMPUTER NETWORK SECURITY,” presented at the INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE). 2016, [Online]. Available: https://sid.ir/paper/944568/en

    Related Journal Papers

  • No record.
  • Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button