ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Security Mechanism for Malicious Node Detection in Ad Hoc Networks

Journal: International Journal of Application or Innovation in Engineering & Management (IJAIEM) (Vol.4, No. 4)

Publication Date:

Authors : ; ;

Page : 171-175

Keywords : Security metrics; network security; attack graph; network hardening;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The security risk of a network against unknown zero day attacks has been thought of as one thing abysmal since software system flaws square measure less foreseeable than hardware faults and therefore the method of finding such flaws and developing exploits looks to be chaotic. during this paper, we tend to propose a unique security metric, k-zero day safety, supported the amount of unknown zero day vulnerabilities. By sanctioning an instantaneous comparison of various security solutions with relation to their relative effectiveness, a network security metric might offer quantitative evidences to help security practitioners in securing laptop networks. However, analysis on security metrics has been hindered by difficulties in handling zero-day attacks exploiting unknown vulnerabilities. In fact, the safety risk of unknown vulnerabilities has been thought of as one thing abysmal attributable to the less foreseeable nature of software system flaws. This causes a serious problem to security metrics, as a result of a safer configuration would be of very little price if it were equally prone to zero-day attacks that's, the metric merely counts what percentage unknown vulnerabilities would be needed for compromising a network quality, in spite of what vulnerabilities those may well be. we tend to formally outline the metric supported Associate in Nursing abstract model of networks and attacks. we tend to then devise algorithms for computing the metric. Finally, we tend to show the metric will quantify several existing practices in hardening a network.

Last modified: 2015-05-15 16:40:20