Modelling computer networks for further security research

Journal Title: Security and Defence Quarterly - Year 2016, Vol 36, Issue 4

Abstract

Computer networks are usually modelled from one aspect, e.g., the physical layer of the network, although this does not allow the researcher to understand all usage of that device. We aim to develop a model which leverages all aspects of a networked computer and, therefore, provides complete information to the scientist for all further security research, especially that related to the social sciences. Network science is about the analysis of any network, from social to protein. It is much easier to analyse computer networks with technical tools than protein networks. It is, therefore, a straightforward way to crawl the web as Albert-Laszlo Barabasi did to model its connections, nodes, and links in graph theory to analyse its internal connections. His analysis was based solely on the network layer. Our methodology uses graph theory and network science and integrates all ISO/OSI (computer networking) layers into the model. Each layer of the ISO/OSI model has its topology separately, but all of them also work as part of the complex system to operate the network. It therefore creates a multipartite graph of the network under analysis. Furthermore, the virtual private networks (VPNs) and application usage are also integrated as nodes and links. With this model, the computer network infrastructure and usage data can be used for further non-computing related research, e.g., social science research, as it includes the usage patterns of the network users.

Authors and Affiliations

Zsolt Bederna, Tamás Szádeczky

Keywords

Related Articles

An easy target? Types of attack on oil tankers by state actors

There was a huge reaction to the attacks that took place in the Gulf of Oman in May and June 2019 but, in fact, attacks on oil tankers are a century old problem. Oil tankers appear to be easy targets because of their siz...

Immigrant integration policy and practices in Poland

Globalization, open borders and population movements, especially from war torn countries, have brought a new set of chances and challenges to every modern state. Since its accession to the European Union in 2004, Poland...

Asymmetric Warfare – Not every war has to end?

The study of warfare, throughout its history, as well as efforts to legally regulate the resort to war and the conduct of war, were concentrated exclusively on one form of warfare - interstate conflict. Only since the te...

“Autonomisation” of security and defence systems

Development of systems with an evolving level of autonomy is among the most controversial and yet promising aspects of military forces’ modernisation. The application of quasi- artificial intelligence in combat machines...

Components of defence strategies in society’s information environment: a case study based on the grounded theory

The goal of this study is to explore the components of defence strategies faced by society in its information environment, and how these strategies are inter-related. This qualitative in-depth case study applied past res...

Download PDF file
  • EP ID EP705792
  • DOI https://doi.org/10.35467/sdq/141572
  • Views 99
  • Downloads 0

How To Cite

Zsolt Bederna, Tamás Szádeczky (2016). Modelling computer networks for further security research. Security and Defence Quarterly, 36(4), -. https://europub.co.uk/articles/-A-705792