Archipelago: A Network Security Analysis Tool
LISA '03 Proceedings of the 17th USENIX conference on System administration
Probabilistic anomaly detection in distributed computer networks
Science of Computer Programming
Voluntary cooperation in pervasive computing services
LISA '05 Proceedings of the 19th conference on Large Installation System Administration Conference - Volume 19
An approach to understanding policy based on autonomy and voluntary cooperation
DSOM'05 Proceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management
International Journal of Information and Computer Security
Hi-index | 0.00 |
We describe a model of computer security that applies results from the statistical properties of graphs to human-computer systems. The model attempts to determine a safe threshold of interconnectivity in a human-computer system by ad hoc network analyses. The results can be applied to physical networks, social networks and networks of clues in a forensic analysis. Access control, intrusions and social engineering can also be discussed as graph- and information-theoretical relationships. Groups of users and shared objects, such as files or conversations, provide communication channels for the spread of both authorized and unauthorized information. We present numerical criteria for measuring the security of such systems and algorithms for finding the vulnerable points.