首页> 外文期刊>International Regional Science Review >Comparative Approaches for Assessing Network Vulnerability
【24h】

Comparative Approaches for Assessing Network Vulnerability

机译:评估网络漏洞的比较方法

获取原文
获取原文并翻译 | 示例
           

摘要

A common theme in analysis and evaluation of network-based critical infrastructure is the assessment of system vulnerability. Graph theoretic, simulation, and optimization-based techniques have played a significant role in examining potential network vulnerabilities given the insights they can provide for mitigating facility loss and prioritizing fortification efforts. Central to these approaches is the concept of facility (arc-node) importance or criticality to system surviv ability. Assessments of network vulnerability can dramatically differ based on how facility importance is characterized. In this review, various approaches for assessing facility importance and network vulnerability are examined. The key differences in these approaches are the ways in which a facility's role in maintaining network operability is evaluated given arc-node disruption. Comparative results suggest significant differences exist among measures of facility importance and network performance. Furthermore, the subsequent incongruities in these measures and their implications need to be clearly understood to support interdiction risk and vulnerability assessment for critical infrastructures.
机译:在基于网络的关键基础结构的分析和评估中,一个共同的主题是对系统漏洞的评估。图论,基于仿真和基于优化的技术在检查潜在的网络漏洞方面发挥了重要作用,因为它们可以为减轻设施损失和确定防御工作的优先级提供见解。这些方法的核心是设施(弧节点)对系统生存能力的重要性或重要性的概念。根据设备重要性的特征,对网络漏洞的评估可能会大不相同。在此审查中,评估了评估设施重要性和网络脆弱性的各种方法。这些方法的主要区别是在给定弧节点中断的情况下评估设施在维护网络可操作性方面的作用的方式。比较结果表明,设施重要性和网络性能的度量之间存在显着差异。此外,需要清楚地理解这些措施随后产生的不一致性及其影响,以支持关键基础设施的拦截风险和脆弱性评估。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号