𝔖 Bobbio Scriptorium
✦   LIBER   ✦

System intrusion processes: a simulation model

✍ Scribed by B.C. Soh; T.S. Dillon


Book ID
104297878
Publisher
Elsevier Science
Year
1997
Tongue
English
Weight
664 KB
Volume
16
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.

✦ Synopsis


In the past few years several break-ins to computer networks and computer systems have occurred, and break-ins are becoming more widespread. They may be the acts of external intruders (outsiders), internal intruders (insiders) or both. More often than not, these intruders attack the system with malicious intent to affect system security attributes, namely secrecy, integrity and service availability. In our paper [l] (Computm fi Security, 1995, 14, 621-631) we use a model to present an analytical study of computer system intrusions. This subsequent paper describes afired-innemen~, lime-advance, discreteevent simulation study of system intrusion processes. The analytical model is subsequently used to validate the simulation study. 01997


πŸ“œ SIMILAR VOLUMES


Development of a process model simulator
✍ Cathal Heavey; Shafi M.S Khanian πŸ“‚ Article πŸ“… 2002 πŸ› Elsevier Science 🌐 English βš– 968 KB