SlideShare a Scribd company logo
ISSN(Online): 2395-xxxx
International Journal of Innovative Research in Computer
and Electronics Engineering
Vol. 1, Issue 4, April 2015
Copyright to IJIRCEE www.ijircee.com 14
Finding Critical Link and Critical Node
Vulnerability for Network
Mr.G.Lenin1
, Mr. D. Ragava Prasad2
, Ms. R. Tharani3
Assistant Professor, Department of CSE, Podhigai College of Engineering & Technology, Tirupattur, Tamilnadu, India1,2,3
ABSTRACT: The vulnerability assessment is the pro-active step to secure network organization. The network
vulnerability is very important in today’s world for critical link and for critical node. The CLD (critical link
disruptor) & CND (critical node disruptor) are always NP complete on the unit disk graph and power law graph
and for the general graph we are analyse the CLD & CND. Finding the solution for CLD & CND problem by using
HILPR algorithm, HILPR algorithm is linear programming algorithm. . In this paper we are proposed one of the novel
methods is belief propagation used for critical link and critical node vulnerability for network vulnerability
assessment and weight of the network.
KEYWORDS: Network vulnerability, critical node, critical link vulnerability assessment Diversity
I. INTRODUCTION
Now a day’s we are study about the network security that is important in today’s world. Firewalls and IDS are
independent layers of security. Firewalls merely examine network packets to determine whether or not to forward them
on to their end destination. Firewalls screen data based on domain names or IP addresses and can screen for low-level
attacks. They are not designed to protect networks from vulnerabilities and improper system configurations. Nor can
they protect from malicious internal activity or rogue assets inside the firewall. Vulnerability assessment takes a wide-
range of network issues into consideration and identifies weaknesses that need correction. Vulnerability assessment
solutions test systems and services such as NetBIOS, HTTP, CGI and WinCGI, FTP, DNS, DoS vulnerabilities, POP3,
SMTP, LDAP, TCP/IP, UDP, Registry, Services, Users and Accounts, password vulnerabilities, publishing extensions,
detection and audit wireless networks, and much more.
Vulnerability analysis aims to provide decision support regarding preventive and restorative actions, ideally
as an integrated part of the planning process. [10]Vulnerability assessment usually focuses mainly on the technology
aspects of vulnerability scanning. The vulnerability scanner works with a proactive approach, it finds vulnerabilities,
hopefully, before they have been used. There is however a possibility that a, to the public, unknown vulnerability is
present in the system vulnerability has two types. Tangible is something which can be measured/ assessed (real)
e.g. Computers, book etc.
Intangible are something which cannot be measured (imaginary). In this paper we study about the
intangible vulnerability. [11]Vulnerability is the measuring weakness of the system or the any network such as ad-hoc
network, World Wide Web, enterprise network. Network vulnerability assessment is study the natural disaster,
unexpected failures of element and also studies the performance of the network reduces in different cases. After
studying the vulnerability of critical links and critical nodes also we are study the vulnerability of network. [1]
Identifying the critical link and critical node for the natural disaster and unexpected failure of network because in the
natural disaster such an earthquake and in the unexpected failure of network. Destroy many important power lines and
a large area blackout.
ISSN(Online): 2395-xxxx
International Journal of Innovative Research in Computer
and Electronics Engineering
Vol. 1, Issue 4, April 2015
Copyright to IJIRCEE www.ijircee.com 15
FIG: 1: Detecting Critical Node between Network A&B
Vulnerability scanning consists of using a computer program to identify vulnerabilities in networks, computer
infrastructure or applications [8]. Vulnerability assessment is the process surrounding vulnerability scanning, also
taking into account other aspects such as risk acceptance, remediation etc. A vulnerability assessment process should be
part of an organization’s effort to control information security risks. This process will allow an organization to obtain a
continuous overview of vulnerabilities in their IT environment and the risks associated with them. [9]Only by
identifying and mitigating vulnerabilities in the IT environment can an organization prevent attackers from penetrating
their networks and stealing information many organizations do not frequently perform vulnerability scans in their
environment. They perform scans on a quarterly or annual basis which only provides a snapshot at that point in
time. The figure below shows a possible vulnerability lifecycle with annual scanning in place.
FIG: 2: Annual Vulnerability scanning
Any vulnerability not detected after a schedule scan takes place, will only be detected at the next
scheduled scan. This could leave systems vulnerable for a long period of time. When implementing a vulnerability
management process, regular scans should be scheduled to reduce the exposure time. The above situation will then
look like this:
ISSN(Online): 2395-xxxx
International Journal of Innovative Research in Computer
and Electronics Engineering
Vol. 1, Issue 4, April 2015
Copyright to IJIRCEE www.ijircee.com 16
FIG: 3: Continuous vulnerability assessment
Regular scanning ensures new vulnerabilities are detected in a timely manner; allow them to be remediated
faster. Having this process in place greatly reduces the risks an organization is facing. When building a
vulnerability assessment process, the following roles should be identified within the organization:
1) Security officer:
2) Vulnerability Engineer:
3) Asset Owner:
4) IT System Engineer
Suppose taking example of MANET[13] for definition of a critical node is a node whose failure or malicious
behaviour disconnects or significantly degrades the performance of the network. Once identified, a critical node can be
the focus of more resource intensive monitoring or other diagnostic measures. If a node is not considered critical, this
metric can be used to help decide if the application or the risk environment warrant the expenditure of the additional
resources required to monitor, diagnose, and alert other nodes about the problem. In order to detect a critical node we
look towards a graph theoretic approach to detect a vertex-cut and an edge-cut. A vertex-cut is a set of vertices whose
removal produces a sub graph with more components than the original graph. A cut-vertex, or articulation point, is a
vertex cut consisting of a single vertex. An edge-cut is a set of edges whose removal produces a sub graph with more
components than the original graph. A cut-edge, or bridge, is an edge-cut consisting of a single edge. Although the cut-
vertex or cut-edge of a graph G can be determined by applying a straight forward algorithm [12], finding a cut-vertex in
the graphical representation of an ad hoc network is not as straightforward, since the nodes cannot be assumed to be
stationary. A network discovery algorithm can give an approximation of the network topology, but the value of such an
approximation in performing any kind of network diagnosis or intrusion detection depends on the degree of mobility of
the nodes.
II. RELATED WORK
We study about the framework and its components for measuring the vulnerability [5]. Either
connectivity or capacity is needed to network reliability analysis .In the area of distributed computing network
reliability is an important issue. For measuring the graph vulnerability use the neighbor-scattering number [6]. In the
world software, vulnerability is increased in the fast way. In the information security the focusing point is software
vulnerability .for the similarity calculation the national vulnerability database and ontology of vulnerability
management provide the needed information. In many area of vulnerability management the similarity measurement
can be used. in software security , data mining , software testing the similarity measurement model of program
execution is used. reducing the quality of software testing method because of the lacking of measurement. by
using the data types the measurements are categorized. For optimization process the similarity graph is used.
Categorization scheme of the standard vulnerability lacking in the assessment of the information system security, lack
of vulnerability is problem in the information system security. For the information system security assessment and
ISSN(Online): 2395-xxxx
International Journal of Innovative Research in Computer
and Electronics Engineering
Vol. 1, Issue 4, April 2015
Copyright to IJIRCEE www.ijircee.com 17
measurement of the software tools and services necessary thing is standard vulnerability taxonomy [7].
Quality of the services is more important in the discovery of topologies because the real time internet
application developed rapidly in the world. So, for assessment the vulnerability of general network topologies we
used the quality of service aware measurement. Many existing works on network vulnerability assessment
mainly focus on the centrality measurements, including degree, be tween’s and closeness centralities, average
shortest path length [6], global clustering coefficients. Due to the failures to assess the network vulnerability using
above measurements, Sun et al. First proposed the total pair wise connectivity as an effective measurement and
empirically evaluate the vulnerability of wireless multichip networks using this metric. Arulselvan et al. [3] showed
the challenge of CND problem by proving its NP-completeness. Later on, the _-disruptor problem was defined by
Dinh et al. [2] to find a minimum set of links or nodes whose removal degrades the total pair wise connectivity to a
desired degree. They proved the NP-completeness of this problem with respect to both links and nodes and the
corresponding in approximability results. Even for the tree topology, Di Summa et al. [4] found that the discovery of
critical nodes also remains NP-complete using this metric. In this paper, we further investigate the theoretical hardness
of both CLD and CND on UDGs and PLGs. In addition, there are a few effective solutions in the literature of the
network vulnerability assessment based on the pair wise connectivity. Arulselvan et al. [3] designed a heuristic
(CNLS) to detect critical nodes, which is however still far away from the optimal solution in large-scale and dense
networks. In [2], Dinh et al. proposed pseudo-approximation algorithms to solve the _-disruptor problem.
However, this problem is defined differently than ours and hard to use its solution when we only know the available
cost to destroy or protect these critical links or nodes.
III. PROPOSED ALGORITHM
A. Design Considerations:
Initially taking nodes & links for drawing graph
Select starting and ending point for finding shortest path.
Solve and find critical node and link
Solve graph for as a general graph ,power law graph and unit disk graph
Lastly solve the belief propagation algorithm for network vulnerability
B. Description of the Proposed Algorithm:
Aim of the proposed algorithm is to find the critical node vulnerability& critical link vulnerability and find network
vulnerability & weight of network. The proposed algorithm is consists of three main steps.
Belief propagation Algorithm:
Step: 1
Every node ni computes vulnerability metric of all its neighboring nodes to which it transmits packets this node
calculates vulnerability belief over time Δt duration.
Step: 2
Node ni periodically calculates vulnerability belief of all its neighbors.
Step: 3
Similarly node ni also gets assessed by its neighboring nodes for belief value
Step: 4
The total vulnerability belief of node ni over Δt
= Σ ni
Step: 5
The total vulnerability belief of network is calculated as
= valunarabality belief node ni
Total No of Node N

Recommended for you

IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...

This document presents a review of using recurrent neural networks for network intrusion detection. It begins with an introduction to intrusion detection systems and the types of attacks they aim to detect. It then discusses previous research on machine learning approaches for intrusion detection, including the use of autoencoders, support vector machines, and other classifiers. The proposed approach uses a recurrent neural network for feature selection and classification of network data. The framework involves data collection, preprocessing including feature selection, training the recurrent neural network classifier, and then using the trained model to detect attacks in new data. Experimental results on benchmark intrusion detection datasets are presented and compared to other machine learning methods.

irjet
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...

The main goal of Intrusion Detection Systems (IDSs) is to detect intrusions. This kind of detection system represents a significant tool in traditional computer based systems for ensuring cyber security. IDS model can be faster and reach more accurate detection rates, by selecting the most related features from the input dataset. Feature selection is an important stage of any IDs to select the optimal subset of features that enhance the process of the training model to become faster and reduce the complexity while preserving or enhancing the performance of the system. In this paper, we proposed a method that based on dividing the input dataset into different subsets according to each attack. Then we performed a feature selection technique using information gain filter for each subset. Then the optimal features set is generated by combining the list of features sets that obtained for each attack. Experimental results that conducted on NSL-KDD dataset shows that the proposed method for feature selection with fewer features, make an improvement to the system accuracy while decreasing the complexity. Moreover, a comparative study is performed to the efficiency of technique for feature selection using different classification methods. To enhance the overall performance, another stage is conducted using Random Forest and PART on voting learning algorithm. The results indicate that the best accuracy is achieved when using the product probability rule.

intrusion detection systemsnsl-kddfeature selection
Secure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selectionSecure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selection

This document proposes NICE, a framework for secure intrusion detection and attack mitigation in virtual network systems. NICE uses distributed agents on cloud servers to monitor traffic, detect vulnerabilities, and generate attack graphs. It profiles virtual machines to identify their state and vulnerabilities. When potential attacks are detected, NICE can quarantine suspicious VMs and inspect their traffic. The attack analyzer correlates alerts, constructs attack graphs, and selects appropriate countermeasures based on the graphs. Evaluations show NICE can effectively detect attacks while minimizing performance overhead for the cloud system.

secure intrusion detection and attack measure sele
ISSN(Online): 2395-xxxx
International Journal of Innovative Research in Computer
and Electronics Engineering
Vol. 1, Issue 4, April 2015
Copyright to IJIRCEE www.ijircee.com 18
IV. SIMULATION RESULTS
Suppose the following graph G1 show the network structure of any lab (L)
Fig: 4: The Network of Lab (L)
FIG: 5: Show the Result for Above Graph (Network of L)
ISSN(Online): 2395-xxxx
International Journal of Innovative Research in Computer
and Electronics Engineering
Vol. 1, Issue 4, April 2015
Copyright to IJIRCEE www.ijircee.com 19
V. CONCLUSION AND FUTURE WORK
The simulation results showed that the proposed algorithm performs better in this paper using Vulnerability Belief
propagation we are study the novel method for Network Vulnerability Assessment about the given graph of network.
We are first find out the shortest path in the network by using Dijkstra algorithm and then find vulnerability
of CLD & CND .For finding the network vulnerability we are use belief propagation algorithm this vulnerability is in
percentage. Also we are finding the weight of the network.
REFERENCES.
1. Anjum R. Albert, I. Albert, and G. L. Nakarado. “Structural vulnerability of the North American power grid.”
Phys. Rev. E, 69(2), Feb 2004.
2. T. Dinh, Y. Xuan, M. Thai, P. Pardalos, and T. Znati. “On new approaches of assessing network vulnerability:
Hardness and approximation”.
Networking, IEEE/ACM Transactions on, 20(2):609 –619, April 2012.
3. A. Arulselvan, C. W. Commander, L. Elefteriadou, and P. M. Pardalos. “Detecting critical nodes in
sparse graphs” Comput. Oper. Res.,
36:2193–2200, July 2009
4. M. D. Summa, A. Grosso, and M. Locatelli. “Complexity of the critical node problem over trees”.Computers
& OR, 38(12):1766–1774, 2011
5. Scarfone, K.; Grance, T. Nat. Inst. of Stand. & Technol., Washington, DC. “A framework for measuring the
vulnerability of hosts”. Information
Technology IT 2008.1st International Conference on,52(1):1-4 May 2008
6. Fengwei Li; Qingfang Ye; Shuhua Wang. “Neighbor-scattering number in regular graphs”, Multimedia
Technology (ICMT), International Conference on . 2209 – 2214, 2011
7. Dept. of Inf. Technol., Mahakal Inst. of Technol., Ujjain, India Computer Technology and Development
(ICCTD).”Towards standardization of vulnerability taxonomy.Towards standardization of vulnerability
taxonomy”, 2nd International Conference on.379-384,2010
8. A. Karygiannis, E. Antonakakis, and A. Apostolopoulos, “Detecting Critical Nodes for MANET Intrusion
Detection Systems”, In Proceedings of IEEE Workshop on Security, Privacy and Trust in Pervasive and
Ubiquitous Computing, pp.7-15, 2006
.

More Related Content

What's hot

11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...
Alexander Decker
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
Alexander Decker
 
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
IJCNCJournal
 
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET Journal
 
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
IJCSIS Research Publications
 
Secure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selectionSecure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selection
Uvaraj Shan
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
IJMER
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
IRJET Journal
 
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SETCLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
IJNSA Journal
 
An efficient intrusion detection using relevance vector machine
An efficient intrusion detection using relevance vector machineAn efficient intrusion detection using relevance vector machine
An efficient intrusion detection using relevance vector machine
IAEME Publication
 
1850 1854
1850 18541850 1854
1850 1854
Editor IJARCET
 
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHMAN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
IJNSA Journal
 
False positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algoFalse positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algo
eSAT Journals
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Editor IJCATR
 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chain
IJCI JOURNAL
 
IDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCAIDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCA
IJCNCJournal
 

What's hot (16)

11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
 
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
 
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
 
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
 
Secure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selectionSecure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selection
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
 
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SETCLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
 
An efficient intrusion detection using relevance vector machine
An efficient intrusion detection using relevance vector machineAn efficient intrusion detection using relevance vector machine
An efficient intrusion detection using relevance vector machine
 
1850 1854
1850 18541850 1854
1850 1854
 
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHMAN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
 
False positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algoFalse positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algo
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chain
 
IDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCAIDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCA
 

Similar to Finding Critical Link and Critical Node Vulnerability for Network

IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET Journal
 
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET Journal
 
Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...
Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...
Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...
IRJET Journal
 
Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...
IAESIJAI
 
Survey of Clustering Based Detection using IDS Technique
Survey of Clustering Based Detection using   IDS Technique Survey of Clustering Based Detection using   IDS Technique
Survey of Clustering Based Detection using IDS Technique
IRJET Journal
 
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewAnalysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
IJERD Editor
 
Response time optimization for vulnerability management system by combining ...
Response time optimization for vulnerability management  system by combining ...Response time optimization for vulnerability management  system by combining ...
Response time optimization for vulnerability management system by combining ...
IJECEIAES
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
IJMIT JOURNAL
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
IJMIT JOURNAL
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
AIRCC Publishing Corporation
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
ijcsit
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
eSAT Publishing House
 
IRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion DetectionIRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion Detection
IRJET Journal
 
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIERATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
CSEIJJournal
 
Attack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest ClassifierAttack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest Classifier
CSEIJJournal
 
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
IJCNCJournal
 
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
IJCNCJournal
 
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDSON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
ijgca
 
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
IJNSA Journal
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation Criteria
IJERA Editor
 

Similar to Finding Critical Link and Critical Node Vulnerability for Network (20)

IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
 
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
 
Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...
Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...
Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...
 
Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...
 
Survey of Clustering Based Detection using IDS Technique
Survey of Clustering Based Detection using   IDS Technique Survey of Clustering Based Detection using   IDS Technique
Survey of Clustering Based Detection using IDS Technique
 
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewAnalysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
 
Response time optimization for vulnerability management system by combining ...
Response time optimization for vulnerability management  system by combining ...Response time optimization for vulnerability management  system by combining ...
Response time optimization for vulnerability management system by combining ...
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 
IRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion DetectionIRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion Detection
 
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIERATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
 
Attack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest ClassifierAttack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest Classifier
 
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
 
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
 
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDSON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
 
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation Criteria
 

More from ijircee

Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed DatabasesEfficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
ijircee
 
Cyclic Sleep Wake Up Scenario for Wireless Body Area Sensor Networks
Cyclic Sleep Wake Up Scenario for Wireless Body Area Sensor NetworksCyclic Sleep Wake Up Scenario for Wireless Body Area Sensor Networks
Cyclic Sleep Wake Up Scenario for Wireless Body Area Sensor Networks
ijircee
 
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
ijircee
 
Mobile Relay in Data-Intensive using Routing Tree WSN
Mobile Relay in Data-Intensive using Routing Tree WSNMobile Relay in Data-Intensive using Routing Tree WSN
Mobile Relay in Data-Intensive using Routing Tree WSN
ijircee
 
A Nobel Approach On Educational Data Mining
A Nobel Approach On Educational Data MiningA Nobel Approach On Educational Data Mining
A Nobel Approach On Educational Data Mining
ijircee
 
Big Data with Rough Set Using Map- Reduce
Big Data with Rough Set Using Map- ReduceBig Data with Rough Set Using Map- Reduce
Big Data with Rough Set Using Map- Reduce
ijircee
 
Ijircee paper-template
Ijircee paper-templateIjircee paper-template
Ijircee paper-template
ijircee
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
ijircee
 

More from ijircee (8)

Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed DatabasesEfficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
 
Cyclic Sleep Wake Up Scenario for Wireless Body Area Sensor Networks
Cyclic Sleep Wake Up Scenario for Wireless Body Area Sensor NetworksCyclic Sleep Wake Up Scenario for Wireless Body Area Sensor Networks
Cyclic Sleep Wake Up Scenario for Wireless Body Area Sensor Networks
 
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
 
Mobile Relay in Data-Intensive using Routing Tree WSN
Mobile Relay in Data-Intensive using Routing Tree WSNMobile Relay in Data-Intensive using Routing Tree WSN
Mobile Relay in Data-Intensive using Routing Tree WSN
 
A Nobel Approach On Educational Data Mining
A Nobel Approach On Educational Data MiningA Nobel Approach On Educational Data Mining
A Nobel Approach On Educational Data Mining
 
Big Data with Rough Set Using Map- Reduce
Big Data with Rough Set Using Map- ReduceBig Data with Rough Set Using Map- Reduce
Big Data with Rough Set Using Map- Reduce
 
Ijircee paper-template
Ijircee paper-templateIjircee paper-template
Ijircee paper-template
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
 

Recently uploaded

Social media management system project report.pdf
Social media management system project report.pdfSocial media management system project report.pdf
Social media management system project report.pdf
Kamal Acharya
 
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdfGUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
ProexportColombia1
 
Chlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptxChlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptx
yadavsuyash008
 
IS Code SP 23: Handbook on concrete mixes
IS Code SP 23: Handbook  on concrete mixesIS Code SP 23: Handbook  on concrete mixes
IS Code SP 23: Handbook on concrete mixes
Mani Krishna Sarkar
 
Unit 1 Information Storage and Retrieval
Unit 1 Information Storage and RetrievalUnit 1 Information Storage and Retrieval
Unit 1 Information Storage and Retrieval
KishorMahale5
 
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K SchemeMSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
Anwar Patel
 
Introduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer NetworkingIntroduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer Networking
Md.Shohel Rana ( M.Sc in CSE Khulna University of Engineering & Technology (KUET))
 
Quadcopter Dynamics, Stability and Control
Quadcopter Dynamics, Stability and ControlQuadcopter Dynamics, Stability and Control
Quadcopter Dynamics, Stability and Control
Blesson Easo Varghese
 
LeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdfLeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdf
pavanaroshni1977
 
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdfGUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
ProexportColombia1
 
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionUnderstanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Bert Blevins
 
Development of Chatbot Using AI/ML Technologies
Development of  Chatbot Using AI/ML TechnologiesDevelopment of  Chatbot Using AI/ML Technologies
Development of Chatbot Using AI/ML Technologies
maisnampibarel
 
Biology for computer science BBOC407 vtu
Biology for computer science BBOC407 vtuBiology for computer science BBOC407 vtu
Biology for computer science BBOC407 vtu
santoshpatilrao33
 
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
IJAEMSJORNAL
 
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Miss Khusi #V08
 
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
sanabts249
 
IWISS Catalog 2024
IWISS Catalog 2024IWISS Catalog 2024
IWISS Catalog 2024
Iwiss Tools Co.,Ltd
 
How to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POSHow to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POS
Celine George
 
Unblocking The Main Thread - Solving ANRs and Frozen Frames
Unblocking The Main Thread - Solving ANRs and Frozen FramesUnblocking The Main Thread - Solving ANRs and Frozen Frames
Unblocking The Main Thread - Solving ANRs and Frozen Frames
Sinan KOZAK
 
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
Mani Krishna Sarkar
 

Recently uploaded (20)

Social media management system project report.pdf
Social media management system project report.pdfSocial media management system project report.pdf
Social media management system project report.pdf
 
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdfGUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
 
Chlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptxChlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptx
 
IS Code SP 23: Handbook on concrete mixes
IS Code SP 23: Handbook  on concrete mixesIS Code SP 23: Handbook  on concrete mixes
IS Code SP 23: Handbook on concrete mixes
 
Unit 1 Information Storage and Retrieval
Unit 1 Information Storage and RetrievalUnit 1 Information Storage and Retrieval
Unit 1 Information Storage and Retrieval
 
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K SchemeMSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
 
Introduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer NetworkingIntroduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer Networking
 
Quadcopter Dynamics, Stability and Control
Quadcopter Dynamics, Stability and ControlQuadcopter Dynamics, Stability and Control
Quadcopter Dynamics, Stability and Control
 
LeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdfLeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdf
 
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdfGUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
 
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionUnderstanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
 
Development of Chatbot Using AI/ML Technologies
Development of  Chatbot Using AI/ML TechnologiesDevelopment of  Chatbot Using AI/ML Technologies
Development of Chatbot Using AI/ML Technologies
 
Biology for computer science BBOC407 vtu
Biology for computer science BBOC407 vtuBiology for computer science BBOC407 vtu
Biology for computer science BBOC407 vtu
 
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
 
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
 
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
 
IWISS Catalog 2024
IWISS Catalog 2024IWISS Catalog 2024
IWISS Catalog 2024
 
How to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POSHow to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POS
 
Unblocking The Main Thread - Solving ANRs and Frozen Frames
Unblocking The Main Thread - Solving ANRs and Frozen FramesUnblocking The Main Thread - Solving ANRs and Frozen Frames
Unblocking The Main Thread - Solving ANRs and Frozen Frames
 
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
 

Finding Critical Link and Critical Node Vulnerability for Network

  • 1. ISSN(Online): 2395-xxxx International Journal of Innovative Research in Computer and Electronics Engineering Vol. 1, Issue 4, April 2015 Copyright to IJIRCEE www.ijircee.com 14 Finding Critical Link and Critical Node Vulnerability for Network Mr.G.Lenin1 , Mr. D. Ragava Prasad2 , Ms. R. Tharani3 Assistant Professor, Department of CSE, Podhigai College of Engineering & Technology, Tirupattur, Tamilnadu, India1,2,3 ABSTRACT: The vulnerability assessment is the pro-active step to secure network organization. The network vulnerability is very important in today’s world for critical link and for critical node. The CLD (critical link disruptor) & CND (critical node disruptor) are always NP complete on the unit disk graph and power law graph and for the general graph we are analyse the CLD & CND. Finding the solution for CLD & CND problem by using HILPR algorithm, HILPR algorithm is linear programming algorithm. . In this paper we are proposed one of the novel methods is belief propagation used for critical link and critical node vulnerability for network vulnerability assessment and weight of the network. KEYWORDS: Network vulnerability, critical node, critical link vulnerability assessment Diversity I. INTRODUCTION Now a day’s we are study about the network security that is important in today’s world. Firewalls and IDS are independent layers of security. Firewalls merely examine network packets to determine whether or not to forward them on to their end destination. Firewalls screen data based on domain names or IP addresses and can screen for low-level attacks. They are not designed to protect networks from vulnerabilities and improper system configurations. Nor can they protect from malicious internal activity or rogue assets inside the firewall. Vulnerability assessment takes a wide- range of network issues into consideration and identifies weaknesses that need correction. Vulnerability assessment solutions test systems and services such as NetBIOS, HTTP, CGI and WinCGI, FTP, DNS, DoS vulnerabilities, POP3, SMTP, LDAP, TCP/IP, UDP, Registry, Services, Users and Accounts, password vulnerabilities, publishing extensions, detection and audit wireless networks, and much more. Vulnerability analysis aims to provide decision support regarding preventive and restorative actions, ideally as an integrated part of the planning process. [10]Vulnerability assessment usually focuses mainly on the technology aspects of vulnerability scanning. The vulnerability scanner works with a proactive approach, it finds vulnerabilities, hopefully, before they have been used. There is however a possibility that a, to the public, unknown vulnerability is present in the system vulnerability has two types. Tangible is something which can be measured/ assessed (real) e.g. Computers, book etc. Intangible are something which cannot be measured (imaginary). In this paper we study about the intangible vulnerability. [11]Vulnerability is the measuring weakness of the system or the any network such as ad-hoc network, World Wide Web, enterprise network. Network vulnerability assessment is study the natural disaster, unexpected failures of element and also studies the performance of the network reduces in different cases. After studying the vulnerability of critical links and critical nodes also we are study the vulnerability of network. [1] Identifying the critical link and critical node for the natural disaster and unexpected failure of network because in the natural disaster such an earthquake and in the unexpected failure of network. Destroy many important power lines and a large area blackout.
  • 2. ISSN(Online): 2395-xxxx International Journal of Innovative Research in Computer and Electronics Engineering Vol. 1, Issue 4, April 2015 Copyright to IJIRCEE www.ijircee.com 15 FIG: 1: Detecting Critical Node between Network A&B Vulnerability scanning consists of using a computer program to identify vulnerabilities in networks, computer infrastructure or applications [8]. Vulnerability assessment is the process surrounding vulnerability scanning, also taking into account other aspects such as risk acceptance, remediation etc. A vulnerability assessment process should be part of an organization’s effort to control information security risks. This process will allow an organization to obtain a continuous overview of vulnerabilities in their IT environment and the risks associated with them. [9]Only by identifying and mitigating vulnerabilities in the IT environment can an organization prevent attackers from penetrating their networks and stealing information many organizations do not frequently perform vulnerability scans in their environment. They perform scans on a quarterly or annual basis which only provides a snapshot at that point in time. The figure below shows a possible vulnerability lifecycle with annual scanning in place. FIG: 2: Annual Vulnerability scanning Any vulnerability not detected after a schedule scan takes place, will only be detected at the next scheduled scan. This could leave systems vulnerable for a long period of time. When implementing a vulnerability management process, regular scans should be scheduled to reduce the exposure time. The above situation will then look like this:
  • 3. ISSN(Online): 2395-xxxx International Journal of Innovative Research in Computer and Electronics Engineering Vol. 1, Issue 4, April 2015 Copyright to IJIRCEE www.ijircee.com 16 FIG: 3: Continuous vulnerability assessment Regular scanning ensures new vulnerabilities are detected in a timely manner; allow them to be remediated faster. Having this process in place greatly reduces the risks an organization is facing. When building a vulnerability assessment process, the following roles should be identified within the organization: 1) Security officer: 2) Vulnerability Engineer: 3) Asset Owner: 4) IT System Engineer Suppose taking example of MANET[13] for definition of a critical node is a node whose failure or malicious behaviour disconnects or significantly degrades the performance of the network. Once identified, a critical node can be the focus of more resource intensive monitoring or other diagnostic measures. If a node is not considered critical, this metric can be used to help decide if the application or the risk environment warrant the expenditure of the additional resources required to monitor, diagnose, and alert other nodes about the problem. In order to detect a critical node we look towards a graph theoretic approach to detect a vertex-cut and an edge-cut. A vertex-cut is a set of vertices whose removal produces a sub graph with more components than the original graph. A cut-vertex, or articulation point, is a vertex cut consisting of a single vertex. An edge-cut is a set of edges whose removal produces a sub graph with more components than the original graph. A cut-edge, or bridge, is an edge-cut consisting of a single edge. Although the cut- vertex or cut-edge of a graph G can be determined by applying a straight forward algorithm [12], finding a cut-vertex in the graphical representation of an ad hoc network is not as straightforward, since the nodes cannot be assumed to be stationary. A network discovery algorithm can give an approximation of the network topology, but the value of such an approximation in performing any kind of network diagnosis or intrusion detection depends on the degree of mobility of the nodes. II. RELATED WORK We study about the framework and its components for measuring the vulnerability [5]. Either connectivity or capacity is needed to network reliability analysis .In the area of distributed computing network reliability is an important issue. For measuring the graph vulnerability use the neighbor-scattering number [6]. In the world software, vulnerability is increased in the fast way. In the information security the focusing point is software vulnerability .for the similarity calculation the national vulnerability database and ontology of vulnerability management provide the needed information. In many area of vulnerability management the similarity measurement can be used. in software security , data mining , software testing the similarity measurement model of program execution is used. reducing the quality of software testing method because of the lacking of measurement. by using the data types the measurements are categorized. For optimization process the similarity graph is used. Categorization scheme of the standard vulnerability lacking in the assessment of the information system security, lack of vulnerability is problem in the information system security. For the information system security assessment and
  • 4. ISSN(Online): 2395-xxxx International Journal of Innovative Research in Computer and Electronics Engineering Vol. 1, Issue 4, April 2015 Copyright to IJIRCEE www.ijircee.com 17 measurement of the software tools and services necessary thing is standard vulnerability taxonomy [7]. Quality of the services is more important in the discovery of topologies because the real time internet application developed rapidly in the world. So, for assessment the vulnerability of general network topologies we used the quality of service aware measurement. Many existing works on network vulnerability assessment mainly focus on the centrality measurements, including degree, be tween’s and closeness centralities, average shortest path length [6], global clustering coefficients. Due to the failures to assess the network vulnerability using above measurements, Sun et al. First proposed the total pair wise connectivity as an effective measurement and empirically evaluate the vulnerability of wireless multichip networks using this metric. Arulselvan et al. [3] showed the challenge of CND problem by proving its NP-completeness. Later on, the _-disruptor problem was defined by Dinh et al. [2] to find a minimum set of links or nodes whose removal degrades the total pair wise connectivity to a desired degree. They proved the NP-completeness of this problem with respect to both links and nodes and the corresponding in approximability results. Even for the tree topology, Di Summa et al. [4] found that the discovery of critical nodes also remains NP-complete using this metric. In this paper, we further investigate the theoretical hardness of both CLD and CND on UDGs and PLGs. In addition, there are a few effective solutions in the literature of the network vulnerability assessment based on the pair wise connectivity. Arulselvan et al. [3] designed a heuristic (CNLS) to detect critical nodes, which is however still far away from the optimal solution in large-scale and dense networks. In [2], Dinh et al. proposed pseudo-approximation algorithms to solve the _-disruptor problem. However, this problem is defined differently than ours and hard to use its solution when we only know the available cost to destroy or protect these critical links or nodes. III. PROPOSED ALGORITHM A. Design Considerations: Initially taking nodes & links for drawing graph Select starting and ending point for finding shortest path. Solve and find critical node and link Solve graph for as a general graph ,power law graph and unit disk graph Lastly solve the belief propagation algorithm for network vulnerability B. Description of the Proposed Algorithm: Aim of the proposed algorithm is to find the critical node vulnerability& critical link vulnerability and find network vulnerability & weight of network. The proposed algorithm is consists of three main steps. Belief propagation Algorithm: Step: 1 Every node ni computes vulnerability metric of all its neighboring nodes to which it transmits packets this node calculates vulnerability belief over time Δt duration. Step: 2 Node ni periodically calculates vulnerability belief of all its neighbors. Step: 3 Similarly node ni also gets assessed by its neighboring nodes for belief value Step: 4 The total vulnerability belief of node ni over Δt = Σ ni Step: 5 The total vulnerability belief of network is calculated as = valunarabality belief node ni Total No of Node N
  • 5. ISSN(Online): 2395-xxxx International Journal of Innovative Research in Computer and Electronics Engineering Vol. 1, Issue 4, April 2015 Copyright to IJIRCEE www.ijircee.com 18 IV. SIMULATION RESULTS Suppose the following graph G1 show the network structure of any lab (L) Fig: 4: The Network of Lab (L) FIG: 5: Show the Result for Above Graph (Network of L)
  • 6. ISSN(Online): 2395-xxxx International Journal of Innovative Research in Computer and Electronics Engineering Vol. 1, Issue 4, April 2015 Copyright to IJIRCEE www.ijircee.com 19 V. CONCLUSION AND FUTURE WORK The simulation results showed that the proposed algorithm performs better in this paper using Vulnerability Belief propagation we are study the novel method for Network Vulnerability Assessment about the given graph of network. We are first find out the shortest path in the network by using Dijkstra algorithm and then find vulnerability of CLD & CND .For finding the network vulnerability we are use belief propagation algorithm this vulnerability is in percentage. Also we are finding the weight of the network. REFERENCES. 1. Anjum R. Albert, I. Albert, and G. L. Nakarado. “Structural vulnerability of the North American power grid.” Phys. Rev. E, 69(2), Feb 2004. 2. T. Dinh, Y. Xuan, M. Thai, P. Pardalos, and T. Znati. “On new approaches of assessing network vulnerability: Hardness and approximation”. Networking, IEEE/ACM Transactions on, 20(2):609 –619, April 2012. 3. A. Arulselvan, C. W. Commander, L. Elefteriadou, and P. M. Pardalos. “Detecting critical nodes in sparse graphs” Comput. Oper. Res., 36:2193–2200, July 2009 4. M. D. Summa, A. Grosso, and M. Locatelli. “Complexity of the critical node problem over trees”.Computers & OR, 38(12):1766–1774, 2011 5. Scarfone, K.; Grance, T. Nat. Inst. of Stand. & Technol., Washington, DC. “A framework for measuring the vulnerability of hosts”. Information Technology IT 2008.1st International Conference on,52(1):1-4 May 2008 6. Fengwei Li; Qingfang Ye; Shuhua Wang. “Neighbor-scattering number in regular graphs”, Multimedia Technology (ICMT), International Conference on . 2209 – 2214, 2011 7. Dept. of Inf. Technol., Mahakal Inst. of Technol., Ujjain, India Computer Technology and Development (ICCTD).”Towards standardization of vulnerability taxonomy.Towards standardization of vulnerability taxonomy”, 2nd International Conference on.379-384,2010 8. A. Karygiannis, E. Antonakakis, and A. Apostolopoulos, “Detecting Critical Nodes for MANET Intrusion Detection Systems”, In Proceedings of IEEE Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, pp.7-15, 2006 .