Open Science Research Excellence
%0 Journal Article
%A Hee Suk Seo and  Tae Kyung Kim
%D 2007 
%J  International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering
%B World Academy of Science, Engineering and Technology
%I International Science Index 12, 2007
%T DEVS Modeling of Network Vulnerability
%U http://waset.org/publications/7155
%V 12
%X As network components grow larger and more diverse,
and as securing them on a host-by-host basis grow more difficult, more
sites are turning to a network security model. We concentrate on
controlling network access to various hosts and the services they offer,
rather than on securing them one by one with a network security model.
We present how the policy rules from vulnerabilities stored in SVDB
(Simulation based Vulnerability Data Base) are inducted, and how to
be used in PBN. In the network security environment, each simulation
model is hierarchically designed by DEVS (Discrete EVent system
Specification) formalism.
%P 1772 - 1775