Preview

Security Analysis of Enterprise Network

Powerful Essays
Open Document
Open Document
4413 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Analysis of Enterprise Network
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2009 proceedings

Security Analysis of Enterprise Network Based on
Stochastic Game Nets Model
Yuanzhuo Wang, Chuang Lin, Senior Member, IEEE, Yang Wang, Kun Meng
Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
Email: {yzwang, clin, ywang, mengkun08}@csnet1.cs.tsinghua.edu.cn
Abstract—In this paper, we propose a novel modeling method,
Stochastic Game Nets (SGN), and use it to model and analyze the security issues in enterprise networks. Firstly, the definition and modeling algorithm of Stochastic Game Nets are given. And then we apply the Stochastic Game Nets method to describe the attack and defense course in the enterprise networks successfully, and find a Nash equilibrium. Finally we analyze the confidentiality and integrity of the enterprise network quantificationally based on the model. The method can also be applied to other areas with respect to a game.
Keywords- Stochastic Game Net, Enterprise Network, Security
Analysis, Integrality, Confidentiality.

I.

INTRODUCTION

Enterprise networks interconnect islands of departmental, local and remote computing and communication resources.
They provide many benefits to organizations using them, such as the enhancement of efficiency, allowing employees greater flexibility in their work habits etc. As the role of enterprise networks, they are keeping expanding in theirs support of both internal and external connectivity in the form of emerging internet, intranet and extranet applications. Unfortunately, owing to all kinds of reasons, the networks always are under the hazard of illegal intrusion. This has given rise to the dichotomy faced by those partaking in the information economy paradigm. Security has become an ever increasingly critical element for enterprise network design and
implementation.



References: and Secure Computing,1(1), 2004. Computer Security Foundations Workshop, 2002. Computer Security Foundations Workshop, 2005. [8] R. Browne. C4i defensive infrastructure for survivability against multimode attacks. In Proceedings of 21st Century Military CommunicationArchitectures and Technologies for Information Superiority, 2000. Springer-Verlag, New York, 1996.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Cited: Solomon, M., & Kim, D. (2013). Fundamentals of Communications and Networking. Burlington: Jones & Bartlett Learning.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    This article gives a high level overview into the 802.11ac wireless standard. 802.11ac is also referred to as “gigabit Wi-Fi” and will be capable of significantly faster data transfer speeds than the current 802.11n. This article includes information on frequency, channels, spatial streams, beam forming and backwards compatibility. PC World is an internationally renowned computer magazine that is published monthly in print and digital form. PC World was established in 1983. The company offers advice, recommendations and information on a wide variety of technological hardware and software. The information in this article shares content that is relevant to the main points of the thesis statement (Bradley, 2012).…

    • 1693 Words
    • 7 Pages
    Good Essays
  • Good Essays

    It 242 Week 8 Assignment

    • 686 Words
    • 3 Pages

    Microwave signals, Infrared Systems, Satellite Signals, and radio systems all have made strides in improving the signal speed and quality. Wireless signals have pros and cons that influence their commercial use and present day application. However, no matter the progress made with wireless signal frequencies they are always subject to interference from technologies limiting their effeteness.…

    • 686 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Semester 2 Assessment November 2012 Department of Electrical and Electronic Engineering ELEN20005 FOUNDATIONS OF ELECTRICAL NETWORKS Time allowed: 180 minutes Reading time: 15 minutes This paper has 28 pages including the 3-page Formulae Sheet The test is printed single-sided.…

    • 2599 Words
    • 11 Pages
    Good Essays
  • Good Essays

    Week 8 It-242

    • 685 Words
    • 3 Pages

    For a while in the past, we refer the wireless technology as cellular phones. But now, the term "wireless" refers to more varied devices & technologies, like smartphones, computers, printers, headphones and even speakers that connects together in different ways. Today’s wireless phones for example, may include data packets like 3G & 4G cellular radio signals, Wi-Fi and even Bluetooth technologies, these technologies have advance in a fast pace that investing in equipment like 4G phone and/or 802.11x wireless routers can offer you & your business a variety of speed improvements for your money. Now I shall describe the characteristics of every type of wireless signal types so we can learn to use every signal type.…

    • 685 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There are multiple vulnerabilities related to the Windows Exchange Servers that need to be address prior to establishing an enterprise security policy. Although all locations are capable of sending and receiving e-mail, they are very susceptible to attack from outside sources.…

    • 628 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The U.S and Allies face many threats during the War on Terror. In an ever-changing operational environment, the ability to adapt and overcome obstacles is a matter of life and death. One of the biggest challenges US Soldiers face is Indirect Fire. Everything from mortars to rockets to UAS’s have the possibility of wreaking havoc upon not only the mission, but everyday life for the personnel living and working on military bases located in hostile environments. The Army realizing this began development on a Counter Rocket Artillery and Mortar (C-RAM) system. This system has been protecting our Soldiers and DA Civilians with much success, not only reducing…

    • 1043 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The first type of wireless radio wave transmission to describe in this paper is 802.11B. The 802.11B was an amendment to the original 802.11 standard released in because the original did not have fast enough speeds to be sufficient to support the needs that the technology required. 802.11B added speeds of 5.5 and 11 Mbps. The 802.11B standard also supports wireless devices that are up…

    • 764 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Survivable. CPs remain lucrative, high-payoff targets for threats particularly those possessing advanced intelligence, surveillance, reconnaissance, long-range fires, and offensive cyberspace and EW capabilities. Ensuring the continuity and survivability of critical CP functions and capabilities is obtained by balancing multiple materiel and nonmaterial considerations to include leaner design; hardening and protection from enemy, weather, and terrain effects (component information systems as well as CP infrastructure); advanced cyberspace and electronic warfare capabilities to defend and protect the Army information network and network- and spectrum-dependent weapons and equipment; camouflage and concealment; decreasing or obscuring the visual, electromagnetic, acoustic, and thermal signature; early detection and identification of threats; intentional capability duplication and diversification; a robust network transport; the ability to displace rapidly; and deception, dispersion, node positioning, and other innovative employment tactics and…

    • 932 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    in partial fulfillment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING…

    • 6336 Words
    • 26 Pages
    Powerful Essays
  • Powerful Essays

    At least 60 days prior to commencing operations, MGMS shall submit to the Commission its proposed minimum system of internal procedures and administrative and accounting controls (internal controls) in accordance with 205 CMR 138.02(4). An Operations Certificate shall not be issued to MGMS for the commencement of gaming operations in accordance with 205 CMR until the submission is approved in accordance with 205 CMR 138.02(2). The Commission or its designee may perform any inspection necessary in order to determine conformance with the approved internal controls.…

    • 1381 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Authorized licensed use limited to: Institutsbibliothek Fuer Informatik. Downloaded on March 31, 2009 at 03:29 from IEEE Xplore. Restrictions apply.…

    • 3752 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    Enterprise Networking

    • 17402 Words
    • 70 Pages

    The copyright in this document is vested in NCC Education Limited. The document must not be…

    • 17402 Words
    • 70 Pages
    Satisfactory Essays
  • Good Essays

    Power Line Carrier System

    • 3929 Words
    • 16 Pages

    This is to certify that the Practical Training Seminar report on “Topic Name” at IRPMU (Satellite Hub Centre), Railways, Delhi from 13th May 2010 to 15th June 2010 is submitted by Miss Monalisa Dhall (07EAIEC302) in partial fulfillment for the award of degree of Bachelor of Technology in Electronics & Communication Engineering has been found satisfactory and is approved for submission.…

    • 3929 Words
    • 16 Pages
    Good Essays
  • Powerful Essays

    Project on street light

    • 7952 Words
    • 32 Pages

    A partial fulfillment of the requirement of Third year Diploma in electronics and telecommunication affiliated to Maharashtra State Board of Technical Education, Mumbai for the Academic Year 2012 -2013.…

    • 7952 Words
    • 32 Pages
    Powerful Essays

Related Topics