Ontology highlight
ABSTRACT:
SUBMITTER: Gil S
PROVIDER: S-EPMC4100021 | biostudies-other | 2014
REPOSITORIES: biostudies-other
Gil Santiago S Kott Alexander A Barabási Albert-László AL
Scientific reports 20140716
While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network ser ...[more]