When a mission changes, the highest degree neighbor may change from the most vulnerable node
to the least vulnerable node
Terrorists are able to intrude into a system connected to critical infrastructure through the most vulnerable node
among numerous nodes of allied nations.
Initially vulnerable nodes
are identified based on analysis of the input traffic by comparing the current traffic with the predefined set of traffic that was labelled as legitimate traffic which was observed over a period of time and stored in the form of a rule.
Global techniques improve security of the entire network by impeding attackers from finding the most vulnerable nodes
, suitable for injecting the malicious code thus converting them to zombies.