Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Article

Download BibTeX

Title

Modelling computer networks for further security research

Authors

[ 1 ] Doctoral School for Safety and Security Sciences, Obuda University, Hungary | [ 2 ] Czech CyberCrime Centre of Excellence C4e, Masaryk University, Czech Republic | [ 3 ] Department of Management and Business Economics, Budapest University of Technology and Economics, Hungary

Year of publication

2021

Published in

Security and Defence Quarterly

Journal year: 2021 | Journal volume: vol. 36 | Journal number: no. 4

Article type

scientific article

Publication language

english

Keywords
EN
  • Computer network
  • Network science
Abstract

EN Computer networks are usually modelled from one aspect, e.g., the physical layer of the network, although this does not allow the researcher to understand all usage of that device. We aim to develop a model which leverages all aspects of a networked computer and, therefore, provides complete information to the scientist for all further security research, especially that related to the social sciences. Network science is about the analysis of any network, from social to protein. It is much easier to analyse computer networks with technical tools than protein networks. It is, therefore, a straightforward way to crawl the web as Albert-Laszlo Barabasi did to model its connections, nodes, and links in graph theory to analyse its internal connections. His analysis was based solely on the network layer. Our methodology uses graph theory and network science and integrates all ISO/OSI (computer networking) layers into the model. Each layer of the ISO/OSI model has its topology separately, but all of them also work as part of the complex system to operate the network. It therefore creates a multipartite graph of the network under analysis. Furthermore, the virtual private networks (VPNs) and application usage are also integrated as nodes and links. With this model, the computer network infrastructure and usage data can be used for further non-computing related research, e.g., social science research, as it includes the usage patterns of the network users.

Date of online publication

11.10.2021

Pages (from - to)

51 - 66

DOI

10.35467/sdq/141572

URL

https://securityanddefence.pl/Modelling-computer-networks-for-further-security-research,141572,0,2.html

License type

CC BY (attribution alone)

Open Access Mode

open journal

Release date

11.10.2021

Date of Open Access to the publication

at the time of publication

Ministry points / journal

70

Ministry points / journal in years 2017-2021

70