Skip to content
Back to outputs

An enhanced view of incidence functions for applying graph theory to modeling network intrusions

Research output: Contribution to journalArticle

Standard

An enhanced view of incidence functions for applying graph theory to modeling network intrusions. / Easttom, William; Adda, Mo.

In: WSEAS Transactions on Information Science and Applications, Vol. 15, 18.06.2020, p. 102-109.

Research output: Contribution to journalArticle

Harvard

APA

Vancouver

Author

Easttom, William ; Adda, Mo. / An enhanced view of incidence functions for applying graph theory to modeling network intrusions. In: WSEAS Transactions on Information Science and Applications. 2020 ; Vol. 15. pp. 102-109.

Bibtex

@article{b0df71e3b9eb4cdc979c0c537aac087b,
title = "An enhanced view of incidence functions for applying graph theory to modeling network intrusions",
abstract = "Graph theory provides a robust tool for modeling a diverse range of subjects. It has been widely applied to computer networks and even network attacks. However, the incidence function in graph theory is often given a cursory treatment. This current research involves applying a range of information theory equations to describe the incidence function in a graph of a computer network. This improves modeling of computer network attacks and intrusions. Specifically attacks that involve substantial changes in network traffic can be more accurately modeled, if the incidence function of the graph is expanded. ",
keywords = "graph theory, Shannon entropy, R{\'e}nyi entropy, incidence functions, information theory",
author = "William Easttom and Mo Adda",
year = "2020",
month = jun,
day = "18",
doi = "10.37394/23209.2020.17.12",
language = "English",
volume = "15",
pages = "102--109",
journal = "WSEAS Transactions on Information Science and Applications",
issn = "1790-0832",
publisher = "World Scientific and Engineering Academy and Society",

}

RIS

TY - JOUR

T1 - An enhanced view of incidence functions for applying graph theory to modeling network intrusions

AU - Easttom, William

AU - Adda, Mo

PY - 2020/6/18

Y1 - 2020/6/18

N2 - Graph theory provides a robust tool for modeling a diverse range of subjects. It has been widely applied to computer networks and even network attacks. However, the incidence function in graph theory is often given a cursory treatment. This current research involves applying a range of information theory equations to describe the incidence function in a graph of a computer network. This improves modeling of computer network attacks and intrusions. Specifically attacks that involve substantial changes in network traffic can be more accurately modeled, if the incidence function of the graph is expanded.

AB - Graph theory provides a robust tool for modeling a diverse range of subjects. It has been widely applied to computer networks and even network attacks. However, the incidence function in graph theory is often given a cursory treatment. This current research involves applying a range of information theory equations to describe the incidence function in a graph of a computer network. This improves modeling of computer network attacks and intrusions. Specifically attacks that involve substantial changes in network traffic can be more accurately modeled, if the incidence function of the graph is expanded.

KW - graph theory

KW - Shannon entropy

KW - Rényi entropy

KW - incidence functions

KW - information theory

U2 - 10.37394/23209.2020.17.12

DO - 10.37394/23209.2020.17.12

M3 - Article

VL - 15

SP - 102

EP - 109

JO - WSEAS Transactions on Information Science and Applications

JF - WSEAS Transactions on Information Science and Applications

SN - 1790-0832

ER -

ID: 21437790