Journal article Open Access

PERFORMANCE MODELING OF NETWORK DEFENSE IN BREADTH SYSTEMS BY MATRIX REWRITING SRN WITH FUZZY PARAMETERS

Guțuleac, Emilian; Zaporojan, Sergiu; Moraru, Victor; Sclifos, Alexei


DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd">
  <identifier identifierType="DOI">10.5281/zenodo.3444051</identifier>
  <creators>
    <creator>
      <creatorName>Guțuleac, Emilian</creatorName>
      <givenName>Emilian</givenName>
      <familyName>Guțuleac</familyName>
      <nameIdentifier nameIdentifierScheme="ORCID" schemeURI="http://orcid.org/">0000-0001-6839-514X</nameIdentifier>
      <affiliation>Technical University of Moldova, 168 Stefan cel Mare bvd., MD-2004 Chisinau, Republic of Moldova</affiliation>
    </creator>
    <creator>
      <creatorName>Zaporojan, Sergiu</creatorName>
      <givenName>Sergiu</givenName>
      <familyName>Zaporojan</familyName>
      <nameIdentifier nameIdentifierScheme="ORCID" schemeURI="http://orcid.org/">0000-0001-5928-4229</nameIdentifier>
      <affiliation>Technical University of Moldova, 168 Stefan cel Mare bvd., MD-2004 Chisinau, Republic of Moldova</affiliation>
    </creator>
    <creator>
      <creatorName>Moraru, Victor</creatorName>
      <givenName>Victor</givenName>
      <familyName>Moraru</familyName>
      <nameIdentifier nameIdentifierScheme="ORCID" schemeURI="http://orcid.org/">0000-0002-5454-8341</nameIdentifier>
      <affiliation>Technical University of Moldova, 168 Stefan cel Mare bvd., MD-2004 Chisinau, Republic of Moldova</affiliation>
    </creator>
    <creator>
      <creatorName>Sclifos, Alexei</creatorName>
      <givenName>Alexei</givenName>
      <familyName>Sclifos</familyName>
      <affiliation>Technical University of Moldova, 168 Stefan cel Mare bvd., MD-2004 Chisinau, Republic of Moldova</affiliation>
    </creator>
  </creators>
  <titles>
    <title>PERFORMANCE MODELING OF NETWORK DEFENSE IN BREADTH SYSTEMS BY MATRIX REWRITING SRN WITH FUZZY PARAMETERS</title>
  </titles>
  <publisher>Zenodo</publisher>
  <publicationYear>2019</publicationYear>
  <subjects>
    <subject>attack</subject>
    <subject>cyber-security</subject>
    <subject>evaluation</subject>
    <subject>fuzzy number</subject>
    <subject>honeypot</subject>
    <subject>moving target defense</subject>
    <subject>reconfiguration</subject>
    <subject>stochastic reward net</subject>
  </subjects>
  <dates>
    <date dateType="Issued">2019-09-18</date>
  </dates>
  <language>en</language>
  <resourceType resourceTypeGeneral="Text">Journal article</resourceType>
  <alternateIdentifiers>
    <alternateIdentifier alternateIdentifierType="url">https://zenodo.org/record/3444051</alternateIdentifier>
  </alternateIdentifiers>
  <relatedIdentifiers>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsVersionOf">10.5281/zenodo.3444050</relatedIdentifier>
  </relatedIdentifiers>
  <rightsList>
    <rights rightsURI="https://creativecommons.org/licenses/by/4.0/legalcode">Creative Commons Attribution 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
  </rightsList>
  <descriptions>
    <description descriptionType="Abstract">&lt;p&gt;We have defined in this paper, a new kind of stochastic reward network (SRN) by introducing matrix attributes and fuzzy parameters of timed transitions and of rewriting rules, called MFRSRN, allowing the dynamic marking-dependent reconfiguration of these models. Moreover, this formalism offers a descriptive language that allows managing the compact representations the model&amp;#39;s size through the introduction of matrix structuring and rewriting mechanisms of the compositional model&amp;#39;s behavior. As an example of application, we show how the proposed formalism can be applied to performance modeling of network &amp;ldquo;Defense in Breadth&amp;rdquo; system which includes the combination of firewall, IDS, honeypot and moving target defense (MTD) techniques, taking into account the probabilistic and epistemic uncertainty aspects.&lt;/p&gt;</description>
  </descriptions>
</resource>
14
42
views
downloads
All versions This version
Views 1414
Downloads 4242
Data volume 38.4 MB38.4 MB
Unique views 1212
Unique downloads 4141

Share

Cite as