Redirigiendo al acceso original de articulo en 19 segundos...
Inicio  /  Information  /  Vol: 9 Par: 9 (2018)  /  Artículo
ARTÍCULO
TITULO

Individual Security and Network Design with Malicious Nodes

Tomasz Janus    
Mateusz Skomra and Marcin Dziubinski    

Resumen

Networks are beneficial to those being connected but can also be used as carriers of contagious hostile attacks. These attacks are often facilitated by exploiting corrupt network users. To protect against the attacks, users can resort to costly defense. The decentralized nature of such protection is known to be inefficient, but the inefficiencies can be mitigated by a careful network design. Is network design still effective when not all users can be trusted? We propose a model of network design and defense with byzantine nodes to address this question. We study the optimal defended networks in the case of centralized defense and, for the case of decentralized defense, we show that the inefficiencies due to decentralization can be mitigated arbitrarily well when the number of nodes in the network is sufficiently large, despite the presence of the byzantine nodes.

 Artículos similares

       
 
Leyla Gamidullaeva, Alexey Finogeev, Mikhail Kataev and Larisa Bulysheva    
Despite of tourism infrastructure and software, the development of tourism is hampered due to the lack of information support, which encapsulates various aspects of travel implementation. This paper highlights a demand for integrating various approaches ... ver más
Revista: Algorithms

 
Afrah Almansoori, Mostafa Al-Emran and Khaled Shaalan    
Cybersecurity procedures and policies are prevalent countermeasures for protecting organizations from cybercrimes and security incidents. Without considering human behaviors, implementing these countermeasures will remain useless. Cybersecurity behavior ... ver más
Revista: Applied Sciences

 
Natalia Sánchez-Patiño, Gina Gallegos-Garcia and Mario E. Rivero-Angeles    
Peer-to-peer (P2P) networks are distributed systems with a communication model in which no central authority governs the behavior of individual peers. These networks currently account for a considerable percentage of all bandwidth worldwide. However, thi... ver más
Revista: Applied Sciences

 
Xueping Song, Shuyu Zhang, Jianming Yang and Jicun Zhang    
Many security detectors do not have the ability to output individual luggage package images and are not compatible with deep learning algorithms. In this paper, a luggage package extraction of X-ray images based on the ES-MBD (Edge Sensitive Multi-channe... ver más
Revista: Applied Sciences

 
Faeiz Alserhani and Alaa Aljared    
With the increased sophistication of cyber-attacks, there is a greater demand for effective network intrusion detection systems (NIDS) to protect against various threats. Traditional NIDS are incapable of detecting modern and sophisticated attacks due to... ver más
Revista: Applied Sciences