System intrusion processes: a simulation model
β Scribed by B.C. Soh; T.S. Dillon
- Book ID
- 104297878
- Publisher
- Elsevier Science
- Year
- 1997
- Tongue
- English
- Weight
- 664 KB
- Volume
- 16
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
β¦ Synopsis
In the past few years several break-ins to computer networks and computer systems have occurred, and break-ins are becoming more widespread. They may be the acts of external intruders (outsiders), internal intruders (insiders) or both. More often than not, these intruders attack the system with malicious intent to affect system security attributes, namely secrecy, integrity and service availability. In our paper [l] (Computm fi Security, 1995, 14, 621-631) we use a model to present an analytical study of computer system intrusions. This subsequent paper describes afired-innemen~, lime-advance, discreteevent simulation study of system intrusion processes. The analytical model is subsequently used to validate the simulation study. 01997
π SIMILAR VOLUMES