Download now Free registration required
As network components grow larger and more diverse, and as securing them on a host-by-host basis grow more difficult, more sites are turning to a network security model. The authors concentrate on controlling network access to various hosts and the services they offer, rather than on securing them one by one with a network security model. The authors present how the policy rules from vulnerabilities stored in SVDB (Simulation based Vulnerability Data Base) are inducted, and how to be used in PBN. In the network security environment, each simulation model is hierarchically designed by DEVS (Discrete EVent system Specification) formalism.
- Format: PDF
- Size: 308.1 KB