scispace - formally typeset
Search or ask a question

Showing papers on "Vulnerability (computing) published in 1986"


Proceedings ArticleDOI
07 Apr 1986
TL;DR: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Abstract: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage. The model includes profiles for representing the behavior of subjects with respect to objects in terms of metrics and statistical models, and rules for acquiring knowledge about this behavior from audit records and for detecting anomalous behavior. The model is independent of any particular system, application environment, system vulnerability, or type of intrusion, thereby providing a framework for a general-purpose intrusion-detection expert system.

960 citations


Journal ArticleDOI
TL;DR: In contrast to the usual probabilistic model for network reliability, one can use a deterministic model which is called network vulnerability, and certain reliability synthesis problems can be converted to a vulnerability question.
Abstract: In contrast to the usual probabilistic model for network reliability, one can use a deterministic model which is called network vulnerability. Many different vulnerability criteria and the related synthesis results are reviewed. These synthesis problems are all graph external questions. Certain reliability synthesis problems can be converted to a vulnerability question. Several open problems and conjectures are presented.

177 citations


Book
30 Nov 1986
TL;DR: In this paper, Thailand's search for national security is used to illustrate factors that underlie the security fabric of developing states, and analyzes the role of intra-country conflict in explaining the state's vulnerability to external intervention.
Abstract: Several factors impact a developing nation's ability to manage its political and related security affairs. Thailand's search for national security is used to illustrate factors that underlie the security fabric of developing states. The author relates the state to the international environment as well as to substate elements, and analyzes the role of intra-country conflict in explaining the state's vulnerability to external intervention.

25 citations


Journal ArticleDOI
18 Apr 1986-Science
TL;DR: The vulnerability military space systems depends on their orbits, functions, and other characteristics, and a combination of passive countermeasures and arms control agreements could give these satellites some protection against such attack.
Abstract: The vulnerability military space systems depends on their orbits, functions, and other characteristics. The high-altitude satellites needed for warning and communications in particular could be vulnerable to prompt destruction by certain space-based systems and, in the future, possibly by ground-based high power lasers. A combination of passive countermeasures and arms control agreements could give these satellites some protection against such attack. Deployment of strategic defensive systems with the capability to reach far into space would invalidate this approach.

6 citations


01 Jan 1986
TL;DR: The choice of a seismic damage assessment method depends fundamentally on how the assessment will be used, but always involves definition of the expected ground motion and the structure and value at risk as mentioned in this paper.
Abstract: The choice of a seismic damage assessment method depends fundamentally on how the assessment will be used, but always involves definition of the expected ground motion and the structure and value at risk. The crux of the problem however is the assessment of the seismic vulnerability, or the conditional damage given the seismic hazard. When a rapid assessment of seismic vulnerability is required, resort must be made to one of several available methods, including (i) judgement by an experienced engineer, (ii) consideration of relevant design codes, (iii) use of empirical relationships, and/or (iv) simplified analytical methods. This paper provides an overview of these methods and outlines the requirements for an advanced analytical method, which is feasible with present knowledge and technology.

1 citations


01 Jan 1986
TL;DR: The Structured Assessment Approach was developed to help assess the vulnerability of safeguards systems to insiders in a staged manner and many features have been added to simplify and facilitate its use for conducting vulnerability analysis.
Abstract: The Structured Assessment Approach (SAA) was developed to help assess the vulnerability of safeguards systems to insiders in a staged manner. For physical security systems, the SAA identifies possible diversion paths which are not safeguarded under various facility operating conditions and insiders who could defeat the system via direct access, collusion or indirect tampering. For material control and accounting systems, the SAA identifies those who could block the detection of a material loss or diversion via data falsification or equipment tampering. The SAA, originally desinged to run on a mainframe computer, has been converted to run on a personal computer. Many features have been added to simplify and facilitate its use for conducting vulnerability analysis. For example, the SAA input, which is a text-like data file, is easily readable and can provide documentation of facility safeguards and assumptions used for the analysis.

1 citations


01 Jan 1986
TL;DR: In this article, a mathematical system framework is developed to model a series of criteria called performance indices (PI) related to engineering risk in water resources, such as reliability, vulnerability, and resilience.
Abstract: A mathematical system framework is developed to model a series of criteria called performance indices (PI) related to engineering risk in water resources. Such criteria include reliability, vulnerability, and resilience. Within the system framework, engineering risk is a combination of PI called a figure of merit (FM). Each design or operation scheme is characterized by a risk FM and other FMs. An example of investigation of supply reliability and risk in reservoir management illustrates the concept, which helps to give a perspective on various approaches to water-related risk analysis.

Book ChapterDOI
01 Jan 1986
TL;DR: A cascade model is presented for combining site hazard, design, architectural and building characteristics data that incor-porate both specific and vague information that new information is used to update prior estimates of vulnerability.
Abstract: Seismic vulnerability analysis of structures generally involves processing many judgments which are based on experience and much data which is ill-defined or conjectural. A cascade model is presented for combining site hazard, design, architectural and building characteristics data that incor-porate both specific and vague information. The cascade model is Bayesian in approach in that new information is used to update prior estimates of vulnerability. The development of the seismic vulnerability evaluation model depends on rules encoded as a set of relations between linguistic variables (for example IF (antecedent 1, antecedent 2, . . .) THEN (conse-quence 1, consequence 2, . . .)). These statements are combined through a fuzzy set system identification model.