Security evaluation of cyber networks under advanced persistent threats

AI-generated keywords: Advanced Persistent Threats Cybersecurity Security Evaluation Network Defense Dynamical System

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • Authors: Lu-Xing Yang, Pengdeng Li, Xiaofan Yang, Luosheng Wen, Yingbo Wu, Yuan Yan Tang
  • Topic: Security evaluation of cyber networks under advanced persistent threats (APTs)
  • Modeling approach: APT-based cyber attack-defense process modeled as an individual-level dynamical system
  • Security metric introduced: "Limit security" - defined as the limit expected fraction of compromised nodes within the network
  • Impact factors on limit security: Explored through theoretical analysis and computer simulations
  • Contribution: Provides valuable insights into understanding and enhancing security posture of cyber networks facing APTs
  • Significance: Advances knowledge in cybersecurity by offering a nuanced perspective on evaluating and fortifying network defenses against sophisticated and persistent threats
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Lu-Xing Yang, Pengdeng Li, Xiaofan Yang, Luosheng Wen, Yingbo Wu, Yuan Yan Tang

Abstract: This paper is devoted to measuring the security of cyber networks under advanced persistent threats (APTs). First, an APT-based cyber attack-defense process is modeled as an individual-level dynamical system. Second, the dynamic model is shown to exhibit the global stability. On this basis, a new security metric of cyber networks, which is known as the limit security, is defined as the limit expected fraction of compromised nodes in the networks. Next, the influence of different factors on the limit security is illuminated through theoretical analysis and computer simulation. This work helps understand the security of cyber networks under APTs.

Submitted to arXiv on 12 Jul. 2017

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 1707.03611v1

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

In their paper titled "Security evaluation of cyber networks under advanced persistent threats," authors Lu-Xing Yang, Pengdeng Li, Xiaofan Yang, Luosheng Wen, Yingbo Wu, and Yuan Yan Tang delve into the critical task of measuring the security of cyber networks in the face of advanced persistent threats (APTs). The study begins by modeling an APT-based cyber attack-defense process as an individual-level dynamical system. Through this modeling approach, the researchers demonstrate the global stability of the dynamic model. Building upon this foundation, they introduce a novel security metric for cyber networks known as "limit security," defined as the limit expected fraction of compromised nodes within the network. Furthermore, the paper sheds light on how various factors impact this limit security through both theoretical analysis and computer simulations. By systematically analyzing these influences, the authors provide valuable insights into understanding and enhancing the security posture of cyber networks facing APTs. This comprehensive exploration contributes to advancing knowledge in cybersecurity by offering a nuanced perspective on evaluating and fortifying network defenses against sophisticated and persistent threats. The findings presented in this work serve as a valuable resource for cybersecurity professionals seeking to bolster their defenses against evolving cyber threats.
Created on 25 Sep. 2025

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.