TY - GEN
T1 - The research on network vulnerability analysis methods
AU - Sun, Shiguo
AU - Luo, Senlin
AU - Li, Xiang
AU - Li, Bo
PY - 2012
Y1 - 2012
N2 - Vulnerability analysis is the basis of satellite network construction. This paper summarized the popular vulnerability Analysis Methods in the field of computer network security. This paper also described and compared these methods. Then this paper introduced the Vulnerability analysis methods for communication network, command & control network, mobile ad hoc network and satellite network. At last, the shortage of current research on satellite network vulnerability was analyzed and the next research idea was proposed.
AB - Vulnerability analysis is the basis of satellite network construction. This paper summarized the popular vulnerability Analysis Methods in the field of computer network security. This paper also described and compared these methods. Then this paper introduced the Vulnerability analysis methods for communication network, command & control network, mobile ad hoc network and satellite network. At last, the shortage of current research on satellite network vulnerability was analyzed and the next research idea was proposed.
KW - Computer Network
KW - Vulnerability Analysis
KW - command and control network
KW - communication network
KW - mobile ad hoc network
KW - satellite network
UR - http://www.scopus.com/inward/record.url?scp=84861003491&partnerID=8YFLogxK
U2 - 10.1109/ISdea.2012.622
DO - 10.1109/ISdea.2012.622
M3 - Conference contribution
AN - SCOPUS:84861003491
SN - 9780769546087
T3 - Proceedings - 2012 International Conference on Intelligent Systems Design and Engineering Applications, ISDEA 2012
SP - 593
EP - 597
BT - Proceedings - 2012 International Conference on Intelligent Systems Design and Engineering Applications, ISDEA 2012
T2 - 2nd International Conference on Intelligent Systems Design and Engineering Applications, ISDEA 2012
Y2 - 6 January 2012 through 7 January 2012
ER -