WebSite Logo
  • Content
  • Similar Resources
  • Metadata
  • Cite This
  • Log-in
  • Fullscreen
Log-in
Do not have an account? Register Now
Forgot your password? Account recovery
  1. Science in China Series : Information Sciences
  2. Science in China Series : Information Sciences : Volume 58
  3. Science in China Series : Information Sciences : Volume 58, Issue 1, January 2015
  4. Strategies for network security
Loading...

Please wait, while we are loading the content...

Science in China Series : Information Sciences : Volume 61
Science in China Series : Information Sciences : Volume 60
Science in China Series : Information Sciences : Volume 59
Science in China Series : Information Sciences : Volume 58
Science in China Series : Information Sciences : Volume 58, Issue 12, December 2015
Science in China Series : Information Sciences : Volume 58, Issue 11, November 2015
Science in China Series : Information Sciences : Volume 58, Issue 10, October 2015
Science in China Series : Information Sciences : Volume 58, Issue 9, September 2015
Science in China Series : Information Sciences : Volume 58, Issue 8, August 2015
Science in China Series : Information Sciences : Volume 58, Issue 7, July 2015
Science in China Series : Information Sciences : Volume 58, Issue 6, June 2015
Science in China Series : Information Sciences : Volume 58, Issue 5, May 2015
Science in China Series : Information Sciences : Volume 58, Issue 4, April 2015
Science in China Series : Information Sciences : Volume 58, Issue 3, March 2015
Science in China Series : Information Sciences : Volume 58, Issue 2, February 2015
Science in China Series : Information Sciences : Volume 58, Issue 1, January 2015
Rational construction of a cellular memory inverter
QoE-driven resource allocation for mobile IP services in wireless network
A fractal and scale-free model of complex networks with hub attraction behaviors
Decidable subsets of open logic and an algorithm for R-calculus
Static output feedback stabilization for systems with time-varying delay based on a matrix transformation method
QSobel: A novel quantum image edge extraction algorithm
On τ-time secure key agreement
Strategies for network security
XAS: Cross-API scripting attacks in social ecosystems
Cryptography on twisted Edwards curves over local fields
Improving multiprocessor performance with fine-grain coherence bypass
Collusion-resistant convertible ring signature schemes
Single image haze removal via depth-based contrast stretching transform
Characteristic model-based H $_{2}$/H $_{∞}$ robust adaptive control during the re-entry of hypersonic cruise vehicles
Link prediction in social networks: the state-of-the-art
Science in China Series : Information Sciences : Volume 57
Science in China Series : Information Sciences : Volume 56
Science in China Series : Information Sciences : Volume 55
Science in China Series : Information Sciences : Volume 54
Science in China Series : Information Sciences : Volume 53
Science in China Series : Information Sciences : Volume 52
Science in China Series : Information Sciences : Volume 51
Science in China Series : Information Sciences : Volume 50
Science in China Series : Information Sciences : Volume 49
Science in China Series : Information Sciences : Volume 48
Science in China Series : Information Sciences : Volume 47
Science in China Series : Information Sciences : Volume 46
Science in China Series : Information Sciences : Volume 45
Science in China Series : Information Sciences : Volume 44

Similar Documents

...
Distributed Automatic Configuration of Complex IPsec-Infrastructures

Article

...
Configuration Tool for a Wireless Sensor Network Integrated Security Framework

Article

...
Integrated Security Analysis on Cascading Failure in Complex Networks

Article

...
Security Schemes for a Mobile Agent Based Network and System Management Framework

Article

...
Management of Security and Security for Management Systems

Article

...
A social network approach to trust management in VANETs

Article

...
Report on the 2nd International Summer School on Network and Service Management

Report

...
On Game-Theoretic Network Security Provisioning

Article

...
Dual-Failure Availability Analysis of Span-Restorable Mesh Networks

Article

Strategies for network security

Content Provider Springer Nature Link
Author Li, AngSheng Li, XueChen Pan, YiCheng Zhang, Wei
Copyright Year 2014
Abstract Security of networks has become an increasingly important issue in the highly connected world. Security depends on attacks. Typical attacks include both cascading failure of virus spreading and of information propagation and physical attacks of removal of nodes or edges. Numerous experiments have shown that none of the existing models construct secure networks, and that the universal properties of power law and small world phenomenon of networks seem unavoidable obstacles for security of networks against attacks. Here, we propose a new strategy of attacks, the attack of rules of evolution of networks. By using the strategy, we proposed a new model of networks which generates provably secure networks. It was shown both analytically and numerically that the best strategy is to attack on the rules of the evolution of networks, that the second best strategy is the attack by cascading failure models, that the third best strategy is the physical attack of removal of nodes or edges, and that the least desirable strategy is the physical attack of deleting structures of the networks. The results characterize and classify the strategies for network security, providing a foundation for a security theory of networks. Equally important, our results demonstrate that security can be achieved provably by structures of networks, that there is a tradeoff between the roles of structures and of thresholds in security engineering, and that power law and small world property are never obstacles of security of networks. Our model explores a number of new principles of networks, including some topological principles, probabilistic principles, and combinatorial principles. The new principles build the foundation for new strategies for enhancing security of networks, and for new protocols of communications and security of the Internet and computer networks etc. We anticipate that our theory can be used in analyzing security of real systems in economy, society and technology.
Starting Page 1
Ending Page 14
Page Count 14
File Format PDF
ISSN 1674733X
Journal Science in China Series : Information Sciences
Volume Number 58
Issue Number 1
e-ISSN 18691919
Language English
Publisher Science China Press
Publisher Date 2014-12-03
Publisher Place Heidelberg
Access Restriction One Nation One Subscription (ONOS)
Subject Keyword complex networks security of networks strategy for network security cascading failure model of networks Information Systems and Communication Service
Content Type Text
Resource Type Article
Subject Computer Science
  • About
  • Disclaimer
  • Feedback
  • Sponsor
  • Contact
  • Chat with Us
About National Digital Library of India (NDLI)
NDLI logo

National Digital Library of India (NDLI) is a virtual repository of learning resources which is not just a repository with search/browse facilities but provides a host of services for the learner community. It is sponsored and mentored by Ministry of Education, Government of India, through its National Mission on Education through Information and Communication Technology (NMEICT). Filtered and federated searching is employed to facilitate focused searching so that learners can find the right resource with least effort and in minimum time. NDLI provides user group-specific services such as Examination Preparatory for School and College students and job aspirants. Services for Researchers and general learners are also provided. NDLI is designed to hold content of any language and provides interface support for 10 most widely used Indian languages. It is built to provide support for all academic levels including researchers and life-long learners, all disciplines, all popular forms of access devices and differently-abled learners. It is designed to enable people to learn and prepare from best practices from all over the world and to facilitate researchers to perform inter-linked exploration from multiple sources. It is developed, operated and maintained from Indian Institute of Technology Kharagpur.

Learn more about this project from here.

Disclaimer

NDLI is a conglomeration of freely available or institutionally contributed or donated or publisher managed contents. Almost all these contents are hosted and accessed from respective sources. The responsibility for authenticity, relevance, completeness, accuracy, reliability and suitability of these contents rests with the respective organization and NDLI has no responsibility or liability for these. Every effort is made to keep the NDLI portal up and running smoothly unless there are some unavoidable technical issues.

Feedback

Sponsor

Ministry of Education, through its National Mission on Education through Information and Communication Technology (NMEICT), has sponsored and funded the National Digital Library of India (NDLI) project.

Contact National Digital Library of India
Central Library (ISO-9001:2015 Certified)
Indian Institute of Technology Kharagpur
Kharagpur, West Bengal, India | PIN - 721302
See location in the Map
03222 282435
Mail: support@ndl.gov.in
Sl. Authority Responsibilities Communication Details
1 Ministry of Education (GoI),
Department of Higher Education
Sanctioning Authority https://www.education.gov.in/ict-initiatives
2 Indian Institute of Technology Kharagpur Host Institute of the Project: The host institute of the project is responsible for providing infrastructure support and hosting the project https://www.iitkgp.ac.in
3 National Digital Library of India Office, Indian Institute of Technology Kharagpur The administrative and infrastructural headquarters of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
4 Project PI / Joint PI Principal Investigator and Joint Principal Investigators of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
Prof. Saswat Chakrabarti  will be added soon
5 Website/Portal (Helpdesk) Queries regarding NDLI and its services support@ndl.gov.in
6 Contents and Copyright Issues Queries related to content curation and copyright issues content@ndl.gov.in
7 National Digital Library of India Club (NDLI Club) Queries related to NDLI Club formation, support, user awareness program, seminar/symposium, collaboration, social media, promotion, and outreach clubsupport@ndl.gov.in
8 Digital Preservation Centre (DPC) Assistance with digitizing and archiving copyright-free printed books dpc@ndl.gov.in
9 IDR Setup or Support Queries related to establishment and support of Institutional Digital Repository (IDR) and IDR workshops idr@ndl.gov.in
I will try my best to help you...
Cite this Content
Loading...