A shortest path network security model

This paper presents a new model, based on the resource- constrained shortest path, for evaluating the security of computer networks. The power of the model is twofold. First, the use of the resource-constrained shortest path as an integral part of the model ties security evaluation metrics to graph...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers & security 1993-03, Vol.12 (2), p.169-189
Hauptverfasser: Fitch, John A., Hoffman, Lance J.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:This paper presents a new model, based on the resource- constrained shortest path, for evaluating the security of computer networks. The power of the model is twofold. First, the use of the resource-constrained shortest path as an integral part of the model ties security evaluation metrics to graph theory, thus providing a rigorous mathematical base for the evaluation of network security. Second, the model allows both local (nodal) and overall (network) security considerations to be incorporated into the security evaluation process. The usefulness of the model is demonstrated by applying the model to examples from current literature. Applying the model to a generalization of the cascade problem not only yields an efficient algorithm (O(N 3)) for the problem, but also points out the underlying security issues in interconnecting independently evaluated systems. As a consequence, the resource-constrained shortest path model leads to a broader understanding of network security risks.
ISSN:0167-4048
1872-6208
DOI:10.1016/0167-4048(93)90100-J