ARTT Taxonomy and Cyber-attack Framewok

被引:0
|
作者
Douad, Mohamed Amine [1 ]
Dahmani, Youcef [2 ]
机构
[1] Ecole Natl Super Informat, Algiers, Algeria
[2] Univ Ibn Khaldoun Tiaret, Tiaret, Algeria
关键词
Cyber-attacks; Taxonomy; System Entity Structure; Discrete Event system Specification;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of computer systems has become essential especially in front of the critical issues of cyber-attacks that can result in the compromise of these systems because any act on a system intends to harm one of the security properties (Confidentiality, Integrity and availability). Studying computer attacks is also essential to design models of attacks aiming to protect against these attacks by modeling the last ones. The development of taxonomies leads to characterize and classify the attacks which lead to understand them. In computer's security taxonomy, we can have two broad categories: cyber-attack's taxonomy and cyber-security taxonomy. In this paper, we propose taxonomy for cyber-attacks according to an attacker vision and the aspect of achieving an attack. This taxonomy is based on 4 dimensions: Attack vector, Result, Type and Target. To generalize our approach, we have used the framework of the Discrete EVent system Specification DEVS. This framework depicts the overall vision of cyber-attacks. To partially validate our work, a simulation is done on a case study of buffer overflow. A DEVS model is described and a simulation is done via this formalism. This case study aims to reinforce our proposal.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Data Mining Based Cyber-Attack Detection
    TIANFIELD Huaglory
    系统仿真技术, 2017, 13 (02) : 90 - 104
  • [22] Predictive model for multistage cyber-attack simulation
    Kour, Ravdeep
    Thaduri, Adithya
    Karim, Ramin
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2020, 11 (03) : 600 - 613
  • [23] Studying The Impacts of Cyber-attack On Smart Grid
    Meraj, Tanzim
    Sharmin, Shaela
    Mahmud, Asif
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL INFORMATION AND COMMUNICATION TECHNOLOGY (EICT), 2015, : 461 - 466
  • [24] Predictive model for multistage cyber-attack simulation
    Ravdeep Kour
    Adithya Thaduri
    Ramin Karim
    International Journal of System Assurance Engineering and Management, 2020, 11 : 600 - 613
  • [25] Labour calls for inquiry into NHS cyber-attack
    O'Dowd, Adrian
    BMJ-BRITISH MEDICAL JOURNAL, 2017, 357
  • [26] Impact of Cyber-Attack on Isolated Power System
    Sahabuddin, Md.
    Dutta, Bilash
    Hassan, Mehedi
    2016 3RD INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION & COMMUNICATION TECHNOLOGY (ICEEICT), 2016,
  • [27] Counterplanning deceptions to foil cyber-attack plans
    Rowe, NC
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 203 - 210
  • [28] Infrastructure Cyber-Attack Awareness Training: Effective or Not?
    White, Garry L.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [29] Cyber-Attack Modeling Analysis Techniques: An Overview
    AL-Mohannadi, Hamad
    Mirza, Qublai
    Namanya, Anitta
    Awan, Irfan
    Cullen, Andrea
    Disso, Jules
    2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 69 - 76
  • [30] Cyber-Attack as a Menace to Effective Governance in Nigeria
    Fayomi, Oluyemi
    Ndubisi, Oly Nelson
    Ayo, Charles
    Chidozie, Felix
    Ajayi, Lady
    Okorie, Uchechukwu
    PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON EGOVERNMENT, 2015, : 107 - 116