Modelling computer networks for further security research
Journal Title: Security and Defence Quarterly - Year 2016, Vol 36, Issue 4
Abstract
Computer networks are usually modelled from one aspect, e.g., the physical layer of the network, although this does not allow the researcher to understand all usage of that device. We aim to develop a model which leverages all aspects of a networked computer and, therefore, provides complete information to the scientist for all further security research, especially that related to the social sciences. Network science is about the analysis of any network, from social to protein. It is much easier to analyse computer networks with technical tools than protein networks. It is, therefore, a straightforward way to crawl the web as Albert-Laszlo Barabasi did to model its connections, nodes, and links in graph theory to analyse its internal connections. His analysis was based solely on the network layer. Our methodology uses graph theory and network science and integrates all ISO/OSI (computer networking) layers into the model. Each layer of the ISO/OSI model has its topology separately, but all of them also work as part of the complex system to operate the network. It therefore creates a multipartite graph of the network under analysis. Furthermore, the virtual private networks (VPNs) and application usage are also integrated as nodes and links. With this model, the computer network infrastructure and usage data can be used for further non-computing related research, e.g., social science research, as it includes the usage patterns of the network users.
Authors and Affiliations
Zsolt Bederna, Tamás Szádeczky
Effects of botnets – a human-organisational approach
Botnets, the remotely controlled networks of computers with malicious aims, have significantly affected the international order from Ukraine to the United States in recent years. Disruptive software, such as malware, ran...
Family as a fundamental social unit shaping security culture: Polish realities
The overall goal of the paper is to address the phenomenon of security culture. The conducted research was focused on analysing the possibilities of influencing the shaping of security culture by looking at the role of f...
Pro-Daesh jihadist propaganda. A study of social media and video games
The fight that Europe and the West must wage against jihadist terrorism will take some time, but if we live up to our values of integration and democracy, we will come out of it soon. As Giovanni Falcone, the Italian jud...
Selected logistics centres in the European Union.
The paper deals with logistics centres. Author presents some various definitions, identifies main functions and classifies logistics centres. The main purpose of the article is to characterize selected logistics centres...
The Balkans and non-military security threats – quality comparative analyses of resilience capabilities regarding hybrid threats
The contemporary security environment indicates non-conventional, asymmetric and hybrid security threats as potentially the most accurate threats to global and regional security. Conflict risks in the regional frame stro...