An Approach to Counteracting the Common Cyber-attacks According to the Metric-Based Model

被引:0
|
作者
Geramiparvar, Mohammad Sirwan [1 ]
Modiri, Nasser [1 ]
机构
[1] Islamic Azad Univ Zanjan, Fac Elect Comp & IT Engn, Zanjan, Iran
关键词
Metric-Based Model; Cyber-attacks; General Weaknesses; Countermeasures; XSS; SQL Injection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays the words such as cyber and electronic attacks are heard of more than any other ones. They refer to the attacks which can ruin the structure and foundation of a company, organization, or even a ministry and cause irreparable damages. Analyzing these intrusions, we ascertain that every cyber-attack benefits from four general weaknesses: innate and structural weakness, configurations, design and implementation, and human-made errors. Concentrating on the relevant weaknesses and overcoming them, we can achieve a secure and stable system. Studying and analyzing common attacks such as XSS and SQL Injection and using metric-based model, this research, therefore, aims to focus on the weaknesses and to present approaches to overcoming the weaknesses and counteracting these attacks.
引用
收藏
页码:81 / 85
页数:5
相关论文
共 50 条
  • [1] A Linguistic Analysis Metric in Detecting Ransomware Cyber-attacks
    Florea, Diana
    Patterson, Wayne
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (11) : 517 - 522
  • [2] A Linguistic Analysis Metric in Detecting Ransomware Cyber-attacks
    Florea, Diana
    Patterson, Wayne
    [J]. International Journal of Advanced Computer Science and Applications, 2021, 12 (11): : 517 - 522
  • [3] Detection of Covert Cyber-Attacks in Interconnected Systems: A Distributed Model-Based Approach
    Barboni, Angelo
    Rezaee, Hamed
    Boem, Francesca
    Parisini, Thomas
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (09) : 3728 - 3741
  • [4] Cyber-Attacks Based in Electromagnetic Effects
    Perotoni, M. B.
    Barreto, R. M.
    Manfrin, S. K.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2016, 14 (06) : 2838 - 2845
  • [5] Detecting cyber-attacks using a CRPS-based monitoring approach
    Harrou, Fouzi
    Bouyeddou, Benamar
    Sun, Ying
    Kadri, Benamar
    [J]. 2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2018, : 618 - 622
  • [6] Social Engineering Based Cyber-Attacks in Kenya
    Obuhuma, James
    Zivuku, Shingai
    [J]. 2020 IST-AFRICA CONFERENCE (IST-AFRICA), 2020,
  • [7] Strategy Matrix for Containing Cyber-Attacks: A Generic Approach
    Mpofu, Nkosinathi
    Chikati, Ronald
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 207 - 215
  • [8] Queryable Semantics to Detect Cyber-Attacks: A Flow-Based Detection Approach
    AlEroud, Ahmed F.
    Karabatis, George
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2018, 48 (02): : 207 - 223
  • [9] A model of deception during cyber-attacks on information systems
    Rowe, NC
    [J]. 2004 IEEE 1ST SYMPOSIUM ON MULTI-AGENT SECURITY & SURVIVABILITY, 2004, : 21 - 30
  • [10] Detecting network cyber-attacks using an integrated statistical approach
    Bouyeddou, Benamar
    Harrou, Fouzi
    Kadri, Benamar
    Sun, Ying
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1435 - 1453