![]() ![]() However, this approach was found inefficient due to long convergence period. The existing Internet approach in handling this issue is to use TTL (time-to-live) of TCP/IP, by which a packet will be dropped whenever the TTL timer expires. This failure has a significant impact on Internet performance, contributed from the inability of the affected router to find alternative link/route in fast manner and from the high probability of packet dropping during the attempt of rerouting. Link or router node failure in a network of Internet is a typical cause of traffic congestion due to the developed forwarding loop at the router. This methodology, which is evaluated in optimizing safety strategies in the sports industry, brings about 40% optimization. Specifically, a heuristic optimization methodology is used with overlapping answers between two contiguous neighborhoods based on the Bloom Filters structure that supports fast listings and searches. To solve the abovementioned problem, the work proposes a hybrid system that aims to identify the best possible approach in the theoretically optimal solution in a short time and with minimal computing resources. This weakness is attributed to even minor problems, and the possible strategies available to the defender are finite but at the same time numerous. The inherent difficulty of implementing the proposed solutions lies in the combined explosion of all possible combinations that make up the solution space, the complete examination of which requires a lot of computational time and computing resources, to the point that their use becomes unprofitable. ![]() The number of corresponding solutions concerns the issue of optimal design of security strategies with a simulation that lies in game theory, with players, the defender on one side defending the system managing the available options of strategic solutions, and the attacker, who chooses the way to strike the system, based on some attack scenarios that cannot be easily predicted. One of the main problems of modern research concerns the optimal design of solutions to address cybersecurity problems, with methods that provide the ability to choose an objective function different from that of the classic problem of more economical design while allowing the use of constraints on any possible variable during planning, including financial resources.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |