The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Key Node Identification Based on Vulnerability Life Cycle and the Importance of Network Topology
|
Author(s): Yuwen Zhu (State Key Laboratory of Mathematical Engineering and Advanced Computing, China)and Lei Yu (Chinese Academy of Sciences, China)
Copyright: 2023
Volume: 15
Issue: 1
Pages: 16
Source title:
International Journal of Digital Crime and Forensics (IJDCF)
Editor(s)-in-Chief: Feng Liu (Chinese Academy of Sciences, China)
DOI: 10.4018/IJDCF.317100
Purchase
|
Abstract
The key network node identification technology plays an important role in comprehending unknown terrains and rapid action planning in network attack and defense confrontation. The conventional key node identification algorithm only takes one type of relationship into consideration; therefore, it is incapable of representing the characteristics of multiple relationships between nodes. Additionally, it typically disregards the periodic change law of network node vulnerability over time. In order to solve the above problems, this paper proposes a network key node identification method based on the vulnerability life cycle and the significance of the network topology. Based on the CVSS score, this paper proposes the calculation method of the vulnerability life cycle risk value, and identifies the key nodes of the network based on the importance of the network topology. Finally, it demonstrates the effectiveness of the method in the selection of key nodes through network instance analysis.
Related Content
Dawei Zhang.
© 2024.
16 pages.
|
Fuhai Jia, Yanru Jia, Jing Li, Zhenghui Liu.
© 2024.
13 pages.
|
Shakir A. Mehdiyev, Tahmasib Kh. Fataliyev.
© 2024.
17 pages.
|
Dawei Zhang.
© 2023.
14 pages.
|
Wenjun Yao, Ying Jiang, Yang Yang.
© 2023.
20 pages.
|
Yuwen Zhu, Lei Yu.
© 2023.
16 pages.
|
Vijay Kumar, Sahil Sharma, Chandan Kumar, Aditya Kumar Sahu.
© 2023.
14 pages.
|
|
|