Security analysis of compromised-neighbor-tolerant networks using stochastics

Xiaohu Li, Linxiong Li

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

A stochastic model is introduced to investigate the security of network systems based on their vulnerability graph abstractions. Instead of doing traditional security analysis, this paper employs the increasing convex order to study the underlying vulnerability graph. The results of this paper can provide an insight on designing a more secure system, as well as an insight on enhancing the security of an existing system.

Original languageEnglish (US)
Article number6236285
Pages (from-to)749-757
Number of pages9
JournalIEEE Transactions on Reliability
Volume61
Issue number3
DOIs
StatePublished - Jul 17 2012
Externally publishedYes

Fingerprint

Stochastic models

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality
  • Electrical and Electronic Engineering

Cite this

@article{b4695b8144a046a0b1bb81cb79316eef,
title = "Security analysis of compromised-neighbor-tolerant networks using stochastics",
abstract = "A stochastic model is introduced to investigate the security of network systems based on their vulnerability graph abstractions. Instead of doing traditional security analysis, this paper employs the increasing convex order to study the underlying vulnerability graph. The results of this paper can provide an insight on designing a more secure system, as well as an insight on enhancing the security of an existing system.",
author = "Xiaohu Li and Linxiong Li",
year = "2012",
month = "7",
day = "17",
doi = "https://doi.org/10.1109/TR.2012.2206273",
language = "English (US)",
volume = "61",
pages = "749--757",
journal = "IEEE Transactions on Reliability",
issn = "0018-9529",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "3",

}

Security analysis of compromised-neighbor-tolerant networks using stochastics. / Li, Xiaohu; Li, Linxiong.

In: IEEE Transactions on Reliability, Vol. 61, No. 3, 6236285, 17.07.2012, p. 749-757.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Security analysis of compromised-neighbor-tolerant networks using stochastics

AU - Li, Xiaohu

AU - Li, Linxiong

PY - 2012/7/17

Y1 - 2012/7/17

N2 - A stochastic model is introduced to investigate the security of network systems based on their vulnerability graph abstractions. Instead of doing traditional security analysis, this paper employs the increasing convex order to study the underlying vulnerability graph. The results of this paper can provide an insight on designing a more secure system, as well as an insight on enhancing the security of an existing system.

AB - A stochastic model is introduced to investigate the security of network systems based on their vulnerability graph abstractions. Instead of doing traditional security analysis, this paper employs the increasing convex order to study the underlying vulnerability graph. The results of this paper can provide an insight on designing a more secure system, as well as an insight on enhancing the security of an existing system.

UR - http://www.scopus.com/inward/record.url?scp=84865775542&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84865775542&partnerID=8YFLogxK

U2 - https://doi.org/10.1109/TR.2012.2206273

DO - https://doi.org/10.1109/TR.2012.2206273

M3 - Article

VL - 61

SP - 749

EP - 757

JO - IEEE Transactions on Reliability

JF - IEEE Transactions on Reliability

SN - 0018-9529

IS - 3

M1 - 6236285

ER -