ARTT Taxonomy and Cyber-attack Framewok

被引:0
|
作者
Douad, Mohamed Amine [1 ]
Dahmani, Youcef [2 ]
机构
[1] Ecole Natl Super Informat, Algiers, Algeria
[2] Univ Ibn Khaldoun Tiaret, Tiaret, Algeria
关键词
Cyber-attacks; Taxonomy; System Entity Structure; Discrete Event system Specification;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of computer systems has become essential especially in front of the critical issues of cyber-attacks that can result in the compromise of these systems because any act on a system intends to harm one of the security properties (Confidentiality, Integrity and availability). Studying computer attacks is also essential to design models of attacks aiming to protect against these attacks by modeling the last ones. The development of taxonomies leads to characterize and classify the attacks which lead to understand them. In computer's security taxonomy, we can have two broad categories: cyber-attack's taxonomy and cyber-security taxonomy. In this paper, we propose taxonomy for cyber-attacks according to an attacker vision and the aspect of achieving an attack. This taxonomy is based on 4 dimensions: Attack vector, Result, Type and Target. To generalize our approach, we have used the framework of the Discrete EVent system Specification DEVS. This framework depicts the overall vision of cyber-attacks. To partially validate our work, a simulation is done on a case study of buffer overflow. A DEVS model is described and a simulation is done via this formalism. This case study aims to reinforce our proposal.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Cyber-Attack Risks Analysis Based on Attack-Defense Trees
    Sun, Wenjun
    Lv, Liqun
    Su, Yang
    Wang, Xu An
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 667 - 678
  • [32] Inductive and Deductive Reasoning to Assist in Cyber-Attack Prediction
    Marin, Ericsson
    Almukaynizi, Mohammed
    Shakarian, Paulo
    2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 262 - 268
  • [33] APT cyber-attack modelling - building a general model
    Lehto, Martti
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2022), 2022, : 121 - 129
  • [34] Compatibility Testing Laboratory Response to Hospital Cyber-Attack
    Hicks, D.
    Fatolitis, L.
    Prichard, A.
    James, L.
    TRANSFUSION, 2023, 63 : 268A - 269A
  • [35] Cyber-attack detection based on controlled invariant sets
    Rosich, Albert
    Voos, Holger
    Darouach, Mohamed
    2014 EUROPEAN CONTROL CONFERENCE (ECC), 2014, : 2176 - 2181
  • [36] Stealthy Cyber-Attack Design Using Dynamic Programming
    Anandl, Sribalaji C.
    Teixeira, Andre M. H.
    2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 3474 - 3479
  • [37] Optimal Linear Cyber-Attack on Remote State Estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01): : 4 - 13
  • [38] Cyber-Attack Event Analysis for EV Charging Stations
    Girdhar, Mansi
    Hong, Junho
    You, Yongsik
    Song, Tai-jin
    Govindarasu, Manimaran
    2023 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, PESGM, 2023,
  • [39] Critical Infrastructure Cyber-Attack Through Firmware Exploitation
    Cuozzo, Gianni
    CRITICAL INFRASTRUCTURE PROTECTION AGAINST HYBRID WARFARE SECURITY RELATED CHALLENGES, 2016, 46 : 115 - 134
  • [40] Predicting Malicious Intention in CPS under Cyber-Attack
    Bezzo, Nicola
    2018 9TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS 2018), 2018, : 351 - 352