Network Security using Graph Theory

Download Now
Provided by: Creative Commons
Topic: Security
Format: PDF
Network monitoring is a primary requirement for any network security. For monitoring network activities, the authors present the concept of traffic dispersion graphs which can help easy identification of access patterns over a network. They also define an adjacency matrix attack graph to analyze and locate potential risks to protect critical network systems against multi step attacks. They suggest optimal solutions and configurations to next generation malware filter, based on graph-theoretic concepts to assess the importance of individual routers within the network, given a traffic pattern.
Download Now

Find By Topic