This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
|
||||||||
|
Paper Details
Paper Title
Network Security Using Graph Theory
Authors
  Rogith.A,  Sangeetha.R,  Nivethitha.R
Abstract
network monitoring is the foremost obligation for any network security. In this paper, for monitoring network activities we present concept of traffic dispersion graph which can help easy identification of access pattern over a network. We define adjacency matrix attack graph to examine and detect possible risks to safeguard the critical network system against multi step attacks. Network optimization can create the effect of increasing capacity of the network. Prioritizing traffic is a highly efficient way to enhance network performance and we can better share the available resources by allowing intermediate node to perform the operations, in addition to forwarding packets.
Keywords- network monitoring, traffic dispersion graphs, attack graphs, network coding, vulnerability.
Publication Details
Unique Identification Number - IJEDR2101006Page Number(s) - 38-41Pubished in - Volume 9 | Issue 1 | January 2021DOI (Digital Object Identifier) -    Publisher - IJEDR (ISSN - 2321-9939)
Cite this Article
  Rogith.A,  Sangeetha.R,  Nivethitha.R,   "Network Security Using Graph Theory", International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Volume.9, Issue 1, pp.38-41, January 2021, Available at :http://www.ijedr.org/papers/IJEDR2101006.pdf
Article Preview
|
|
||||||
|