Security and Communication Networks

Security Measurements of Cyber Networks


Publishing date
01 Jun 2018
Status
Published
Submission deadline
12 Jan 2018

Lead Editor

1Xidian University, Xi’an, China; Aalto University, Aalto, Finland

2University of Chinese Academy of Sciences, Beijing, China

3University of Texas at San Antonio, San Antonio, USA

4Deakin University, Melbourne, Australia


Security Measurements of Cyber Networks

Description

Cyber networks facilitate and expedite the development of information and communication technologies and digital economies. Indeed, cyber networks are becoming fundamental to many aspects of our lives, both working and social. However, as networks become larger, heterogeneous, and pluralistic, evaluation of the security of cyber networks becomes increasingly difficult. Attacks and intrusions upon cyber networks can have serious impacts from personal-level to national-level security. As such, there is a rising need to understand, and measure, network security for a range of requirements and standards and in the context of different network scenarios. Although many prior studies have been dedicated to network intrusion detection, malware detection, and security threat defense, a generally accepted security measurement framework is still absent. Such a system is urgently required for the rapid identification of security holes, assessment of potential threats, and implementation of efficient fixes.

Several pertinent questions exist for security measurement theories and methods in terms of security-related data collection, composition, analytics, and processing. This is especially true for detecting security threats and measuring cyber network security in a quantified, precise, and efficient manner: (i) How may we adaptively collect related data for security measurement in the context of large-scale heterogeneous networks, in a generic and pervasive way? (ii) How may we compose and fuse collected big data for economic data storage and transmission, as well as efficient data processing, for precise security threat detection and judgment? (iii) How may we protect valuable data, preserve privacy, and effectively control its access? (iv) How may we aggregate and mine security-related data to finally measure the security of the whole network in a quantified manner? These open and interesting issues are now attracting significant attention.

This Special Issue will bring together recent advances on security data collection and analysis; detection of malware, virus, and network intrusion; and network system protection, in the context of network security assessment and measurement. It welcomes original and innovative research on theories, methodologies, schemes, algorithms, and tools related to security measurements of cyber networks, from academia, industry, and government. Inquiries about potential review articles should be directed to the Special Issue Editor  in Chief.

Potential topics include but are not limited to the following:

  • Theories, frameworks, and tools for security measurement
  • Network security data collection, transmission, processing, and analysis
  • Network security data fusion, composition, and mining
  • Big data security and trust
  • Malware, virus, and intrusion detection
  • Network system protection
  • Security data access control
  • Security in heterogeneous networks and complex systems
  • Cyber hacking and protection
  • Network security simulation and toolkits
  • Standards for network security measurement
  • Assurance methods for network security
  • Network data trust management

Articles

  • Special Issue
  • - Volume 2018
  • - Article ID 6545314
  • - Editorial

Security Measurements of Cyber Networks

Zheng Yan | Yuqing Zhang | ... | Yang Xiang
  • Special Issue
  • - Volume 2018
  • - Article ID 6510381
  • - Research Article

An Imbalanced Malicious Domains Detection Method Based on Passive DNS Traffic Analysis

Zhenyan Liu | Yifei Zeng | ... | Jiangtao Liu
  • Special Issue
  • - Volume 2018
  • - Article ID 7693861
  • - Research Article

OFFDTAN: A New Approach of Offline Dynamic Taint Analysis for Binaries

Xiajing Wang | Rui Ma | ... | Hongzhou Chen
  • Special Issue
  • - Volume 2018
  • - Article ID 7412627
  • - Research Article

Security Measurement for Unknown Threats Based on Attack Preferences

Lihua Yin | Yanwei Sun | ... | Binxing Fang
  • Special Issue
  • - Volume 2018
  • - Article ID 7384194
  • - Research Article

HAC: Hybrid Access Control for Online Social Networks

Fangfang Shan | Hui Li | ... | Ben Niu
  • Special Issue
  • - Volume 2018
  • - Article ID 8210614
  • - Review Article

Data Fusion for Network Intrusion Detection: A Review

Guoquan Li | Zheng Yan | ... | Hanlu Chen
  • Special Issue
  • - Volume 2018
  • - Article ID 4231326
  • - Research Article

Uncovering Tor: An Examination of the Network Structure

Bryan Monk | Julianna Mitchell | ... | Garth Davies
  • Special Issue
  • - Volume 2018
  • - Article ID 3652170
  • - Research Article

An Approach for Internal Network Security Metric Based on Attack Probability

Chun Shan | Benfu Jiang | ... | Na Xiao
  • Special Issue
  • - Volume 2018
  • - Article ID 2058429
  • - Research Article

A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments

Yun Chen | Kun Lv | Changzhen Hu
  • Special Issue
  • - Volume 2018
  • - Article ID 9482345
  • - Research Article

A New Type of Graphical Passwords Based on Odd-Elegant Labelled Graphs

Hongyu Wang | Jin Xu | ... | Hongyan Zhang
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

Article of the Year Award: Impactful research contributions of 2022, as selected by our Chief Editors. Discover the winning articles.