The research on network vulnerability analysis methods

Shiguo Sun*, Senlin Luo, Xiang Li, Bo Li

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

Vulnerability analysis is the basis of satellite network construction. This paper summarized the popular vulnerability Analysis Methods in the field of computer network security. This paper also described and compared these methods. Then this paper introduced the Vulnerability analysis methods for communication network, command & control network, mobile ad hoc network and satellite network. At last, the shortage of current research on satellite network vulnerability was analyzed and the next research idea was proposed.

Original languageEnglish
Title of host publicationProceedings - 2012 International Conference on Intelligent Systems Design and Engineering Applications, ISDEA 2012
Pages593-597
Number of pages5
DOIs
Publication statusPublished - 2012
Event2nd International Conference on Intelligent Systems Design and Engineering Applications, ISDEA 2012 - Sanya, Hainan, China
Duration: 6 Jan 20127 Jan 2012

Publication series

NameProceedings - 2012 International Conference on Intelligent Systems Design and Engineering Applications, ISDEA 2012

Conference

Conference2nd International Conference on Intelligent Systems Design and Engineering Applications, ISDEA 2012
Country/TerritoryChina
CitySanya, Hainan
Period6/01/127/01/12

Keywords

  • Computer Network
  • Vulnerability Analysis
  • command and control network
  • communication network
  • mobile ad hoc network
  • satellite network

Fingerprint

Dive into the research topics of 'The research on network vulnerability analysis methods'. Together they form a unique fingerprint.

Cite this