Category: Blog

  • Project Log: Day 17 – Crown Jewels Version

    I mentioned it this morning, I could re-program my simulation-based optimization thing to aim for different objectives… And so I did. Here the results: Same visualization as the last one (left: before, right: after optimization, top: Protection, bottom: detection&cleaning). Now suppose you want to protect SPECIFICALLY say 4 nodes from infection, say your DB Servers…

  • Project Log: Day 17

    It’s been a hell of a week so far. A good one. Now I have the weekend in front of me, and as I’m a bit tired, I’ll slow down a bit. Or maybe next week, instead. Regardless, I need to plan what’s next. Upcoming objectives Applicability 1: In the network security world, sometimes you…

  • Project Log: Day 15

    A short entry to mention the actual observable/understandable progress. So you have a few nodes on a network (with some considerations). You can act on two variables for each of the nodes: Their protection (beta) or their quickness to clear an infection (mu). Improving both parameters for a node reduces the risk of infection for…