首页> 外文期刊>Journal of Applied Mathematics and Bioinformatics >Mathematical Description of Cyber-Attacks and Proactive Defences
【24h】

Mathematical Description of Cyber-Attacks and Proactive Defences

机译:网络攻击和主动防御的数学描述

获取原文
           

摘要

The main purpose of this paper is to document a holistic modeling background and set up a corresponding mathematical theory in order to provide a rigorous description of cyber-attacks and cyber-security. The starting point is to determine the concepts of valuations and vulnerabilities of parts of a node constituent. Based on these two concepts, one may be led to consider the fundamental concept of node supervision and subsequently to give the definition of cyber-effects and from this the definition of cyber-interaction. As we shall see a germ of cyber-attack can be viewed as a family of cyber-interactions with coherence properties and depending strongly on subjective purposes, information and/or estimates on the valuations and the vulnerabilities of parts of the involved nodes. In general the germs of cyber-attacks can be distinguished in three types: the germs of correlated cyber-attacks, the germs of absolute cyber-attacks and the germs of partial cyber-attacks. This approach provides immediate possibility of rigorous determination of the concepts of proactive cyber defense and proactive cyber protection.
机译:本文的主要目的是记录整体建模背景并建立相应的数学理论,以便对网络攻击和网络安全提供严格的描述。起点是确定节点组成部分的评估和漏洞的概念。基于这两个概念,可能会导致人们考虑节点监督的基本概念,然后给出网络影响的定义,并由此定义网络交互的定义。就像我们将看到的那样,网络攻击的源头可以看作是具有相干属性的网络交互的一族,并且在很大程度上取决于主观目的,有关节点的部分价值和漏洞的信息和/或估计。一般而言,网络攻击的源可分为三种类型:相关的网络攻击的源,绝对网络攻击的源和部分网络攻击的源。这种方法为严格确定主动网络防御和主动网络保护的概念提供了立即的可能性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号