SZÁDECZKY, Tamás and Zsolt BEDERNA. Modelling computer networks for further security research. Security and Defence Quarterly. 2021, vol. 36, No 4, p. 51-66. ISSN 2300-8741. Available from: https://dx.doi.org/10.35467/sdq/141572.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Modelling computer networks for further security research
Authors SZÁDECZKY, Tamás (348 Hungary, belonging to the institution) and Zsolt BEDERNA (348 Hungary).
Edition Security and Defence Quarterly, 2021, 2300-8741.
Other information
Original language English
Type of outcome Article in a journal
Field of Study 50501 Law
Country of publisher Poland
Confidentiality degree is not subject to a state or trade secret
WWW Open access časopisu
RIV identification code RIV/00216224:14220/21:00124489
Organization unit Faculty of Law
Doi http://dx.doi.org/10.35467/sdq/141572
Keywords in English security; cybersecurity
Tags rivok
Tags International impact, Reviewed
Changed by Changed by: Mgr. Petra Georgala, učo 32967. Changed: 14/4/2022 12:04.
Abstract
Computer networks are usually modelled from one aspect, e.g., the physical layer of the network, although this does not allow the researcher to understand all usage of that device. We aim to develop a model which leverages all aspects of a networked computer and, therefore, provides complete information to the scientist for all further security research, especially that related to the social sciences. Network science is about the analysis of any network, from social to protein. It is much easier to analyse computer networks with technical tools than protein networks. It is, therefore, a straightforward way to crawl the web as Albert-Laszlo Barabasi did to model its connections, nodes, and links in graph theory to analyse its internal connections. His analysis was based solely on the network layer. Our methodology uses graph theory and network science and integrates all ISO/OSI (computer networking) layers into the model. Each layer of the ISO/OSI model has its topology separately, but all of them also work as part of the complex system to operate the network. It therefore creates a multipartite graph of the network under analysis. Furthermore, the virtual private networks (VPNs) and application usage are also integrated as nodes and links. With this model, the computer network infrastructure and usage data can be used for further non-computing related research, e.g., social science research, as it includes the usage patterns of the network users.
Links
EF16_019/0000822, research and development projectName: Centrum excelence pro kyberkriminalitu, kyberbezpečnost a ochranu kritických informačních infrastruktur
PrintDisplayed: 30/7/2024 14:22