ATTACK GRAPH ANALYSIS USING -NS2

Main Article Content

Miss: Vijaya Desai
Mrs: Jyoti Nighot

Abstract

we describe large network environment needs multiple sensors to monitor network traffic. Deploying and managing sensors in network’s demanding task. Attack graph showing all possible paths. This paperinvestigate how the IDS sensors are placed using attack graph analysis with some evaluation criteria using MOGA with NS2.

Downloads

Download data is not yet available.

Article Details

How to Cite
Miss: Vijaya Desai, & Mrs: Jyoti Nighot. (2021). ATTACK GRAPH ANALYSIS USING -NS2 . International Journal of Innovations in Engineering Research and Technology, 1-3. https://repo.ijiert.org/index.php/ijiert/article/view/1001
Section
Articles

How to Cite

Miss: Vijaya Desai, & Mrs: Jyoti Nighot. (2021). ATTACK GRAPH ANALYSIS USING -NS2 . International Journal of Innovations in Engineering Research and Technology, 1-3. https://repo.ijiert.org/index.php/ijiert/article/view/1001

Similar Articles

You may also start an advanced similarity search for this article.