Proceedings ArticleDOI
Determination of network vulnerability factor using rough set
Sanklan Saxena,Anugrah Kumar,Sanjiban Sekhar Roy +2 more
- pp 263-268
Reads0
Chats0
TLDR
Rough Set theory is used to trim down the massive data of factors of vulnerability of a network for a successful intrusion or attack, based on Rough set theory.Abstract:
Vulnerability of a Network (can be an office LAN or computer systems connected together for secure data communication) is defined as susceptibility of a network for a successful intrusion or attack. Network's vulnerability depends on some specific factors. In this paper we have used Rough Set theory to trim down the massive data of factors. The paper considers various possibilities with different possible combinations of attack factors and deducting rules, based on Rough set theory. Thus, determining Vulnerability factor of the Network; describing proneness of the network for a successful attack. Albeit the paper considers only few factors, there can be enormous number of factors.read more
Citations
More filters
Proceedings ArticleDOI
Improving Circuit Miniaturization and Its Efficiency Using Rough Set Theory
TL;DR: In this paper, an approach using artificial intelligence technique with the help of rough set theory is proposed which basically lessens the number of gates in the circuit, based on decision rules.
References
More filters
Proceedings ArticleDOI
Topological analysis of network attack vulnerability
TL;DR: It is shown how attack graphs can be used to compute actual sets of hardening measures that guarantee the safety of given critical resources, and offer a promising solution for administrators to monitor and predict the progress of an intrusion, and take appropriate countermeasures in a timely manner.
Journal Article
Concept approximations based on rough sets and similarity measures
Jamil Saquer,Jitender S. Deogun +1 more
TL;DR: This paper presents two different approaches to the concept approximation, one based on rough set theory while the other based on a similarity measure, and presents algorithms for the two approaches.