Learn More
Cyber attacks prediction is an important part of risk management. Existing cyber attacks prediction methods did not fully consider the specific environment factors of the target network, which may make the results deviate from the true situation. In this paper, we propose a cyber attacks prediction model based on Bayesian network. We use attack graphs to(More)
In mobile networks, cooperative authentication is an efficient way to recognize false identities and messages. However, an attacker can track the location of cooperative mobile nodes by monitoring their communications. Moreover, mobile nodes consume their own resources when cooperating with other nodes in the process of authentication. These two factors(More)
Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the(More)
Traditional information security models focus on protecting information or information systems. There is little research on controllability of information content security. We present the network reference monitor (NRM) for access control in Internet environment firstly. Then we propose the definition of network reference monitor and Internet information(More)
Integrity is one of essential properties of information security. It is necessary to analyze integrity of system quantitatively in order to protect the system security. For the purpose, we present formal definitions of integrity based on probabilistic computation tree logic (PCTL) and quantitative evaluation model of integrity. In the model, we model(More)
Formal approaches have been used traditionally to verify whether systems fulfill certain property especially in the field of model checking. However, those formal specifications are strongly biased by the underlying verification model instead of representing the intuitive concepts. And few people researches on relations between different properties. In this(More)