Abstract
Given a choice among multiple security monitoring solutions and multiple locations to deploy them,what strategy best protects the network? What metric is used to compare different securing strategies? What constraints make it harder/easier to secure critical infrastructure networks? This paper explores these questions and formalizes the network monitoring strategy problem for critical infrastructure networks. It also presents a deterministic polynomial time algorithm for discovering a near-optimal network monitoring strategy.
Original language | English (US) |
---|---|
Pages (from-to) | 4-7 |
Number of pages | 4 |
Journal | Performance Evaluation Review |
Volume | 47 |
Issue number | 4 |
DOIs | |
State | Published - Apr 30 2020 |
Externally published | Yes |
ASJC Scopus subject areas
- Software
- Hardware and Architecture
- Computer Networks and Communications