ARTT Taxonomy and Cyber-attack Framewok

被引:0
|
作者
Douad, Mohamed Amine [1 ]
Dahmani, Youcef [2 ]
机构
[1] Ecole Natl Super Informat, Algiers, Algeria
[2] Univ Ibn Khaldoun Tiaret, Tiaret, Algeria
关键词
Cyber-attacks; Taxonomy; System Entity Structure; Discrete Event system Specification;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of computer systems has become essential especially in front of the critical issues of cyber-attacks that can result in the compromise of these systems because any act on a system intends to harm one of the security properties (Confidentiality, Integrity and availability). Studying computer attacks is also essential to design models of attacks aiming to protect against these attacks by modeling the last ones. The development of taxonomies leads to characterize and classify the attacks which lead to understand them. In computer's security taxonomy, we can have two broad categories: cyber-attack's taxonomy and cyber-security taxonomy. In this paper, we propose taxonomy for cyber-attacks according to an attacker vision and the aspect of achieving an attack. This taxonomy is based on 4 dimensions: Attack vector, Result, Type and Target. To generalize our approach, we have used the framework of the Discrete EVent system Specification DEVS. This framework depicts the overall vision of cyber-attacks. To partially validate our work, a simulation is done on a case study of buffer overflow. A DEVS model is described and a simulation is done via this formalism. This case study aims to reinforce our proposal.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A systematic classification scheme for cyber-attack taxonomy
    Kim, S.
    Shin, J.
    Heo, G.
    Song, J. G.
    SAFETY AND RELIABILITY - SAFE SOCIETIES IN A CHANGING WORLD, 2018, : 3013 - 3019
  • [2] Cyber-Attack Attributes
    Kadivar, Mehdi
    TECHNOLOGY INNOVATION MANAGEMENT REVIEW, 2014, : 22 - 27
  • [3] AVOIDITALS: Enhanced Cyber-attack Taxonomy in Securing Information Technology Infrastructure
    Syafrizal, Melwin
    Selamat, Siti Rahayu
    Zakaria, Nurul Azma
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (08): : 1 - 12
  • [4] The Law of Cyber-Attack
    Hathaway, Oona A.
    Crootof, Rebecca
    Levitz, Philip
    Nix, Haley
    Nowlan, Aileen
    Perdue, William
    Spiegel, Julia
    CALIFORNIA LAW REVIEW, 2012, 100 (04) : 817 - 885
  • [5] Cyber-attack group analysis method based on association of cyber-attack information
    Son, Kyung-ho
    Kim, Byung-ik
    Lee, Tae-jin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 260 - 280
  • [6] Understanding of Cyber-Attack Vulnerabilities During Natural Disasters and Discussing A Cyber-Attack Resiliency Framework
    Chakraborty, Suryadip
    Mombeshora, Elton M.
    Clark, Kyra P.
    Mbavarira, Tanaka S.
    SOUTHEASTCON 2024, 2024, : 466 - 471
  • [7] The Future Roadmap for Cyber-attack Detection
    Soleymanzadeh, Raha
    Kashef, Rasha
    2022 6TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2022, 2022, : 66 - 70
  • [8] Cyber-attack as inevitable kinetic war
    Lilienthal, Gary
    Ahmad, Nehaluddin
    COMPUTER LAW & SECURITY REVIEW, 2015, 31 (03) : 390 - 400
  • [9] Cyber-attack and defense simulation framework
    Bergin, Dennis Lee
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2015, 12 (04): : 383 - 392
  • [10] Adaptive cyber-attack modeling system
    Gonsalves, Paul G.
    Dougherty, Edward T.
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C31)TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE V, 2006, 6201