ARTT Taxonomy and Cyber-attack Framewok

被引:0
|
作者
Douad, Mohamed Amine [1 ]
Dahmani, Youcef [2 ]
机构
[1] Ecole Natl Super Informat, Algiers, Algeria
[2] Univ Ibn Khaldoun Tiaret, Tiaret, Algeria
关键词
Cyber-attacks; Taxonomy; System Entity Structure; Discrete Event system Specification;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of computer systems has become essential especially in front of the critical issues of cyber-attacks that can result in the compromise of these systems because any act on a system intends to harm one of the security properties (Confidentiality, Integrity and availability). Studying computer attacks is also essential to design models of attacks aiming to protect against these attacks by modeling the last ones. The development of taxonomies leads to characterize and classify the attacks which lead to understand them. In computer's security taxonomy, we can have two broad categories: cyber-attack's taxonomy and cyber-security taxonomy. In this paper, we propose taxonomy for cyber-attacks according to an attacker vision and the aspect of achieving an attack. This taxonomy is based on 4 dimensions: Attack vector, Result, Type and Target. To generalize our approach, we have used the framework of the Discrete EVent system Specification DEVS. This framework depicts the overall vision of cyber-attacks. To partially validate our work, a simulation is done on a case study of buffer overflow. A DEVS model is described and a simulation is done via this formalism. This case study aims to reinforce our proposal.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] A Stealth Cyber-Attack Detection Strategy for DC Microgrids
    Sahoo, Subham
    Mishra, Sukumar
    Peng, Jimmy Chih-Hsien
    Dragicevic, Tomislav
    IEEE TRANSACTIONS ON POWER ELECTRONICS, 2019, 34 (08) : 8162 - 8174
  • [42] The Enemy Within: The Challenge for Business from Cyber-attack
    Reynolds, Michael
    GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 123 - 136
  • [43] Are miserly budgets putting businesses at risk of cyber-attack?
    Brown T.
    Computer Fraud and Security, 2018, 2018 (08): : 9 - 11
  • [44] Improving Cyber-Attack Predictions Through Information Foraging
    Dalton, Adam
    Dorr, Bonnie
    Liang, Leon
    Hollingshead, Kristy
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 4642 - 4647
  • [45] A Cyber-Attack Detection Model Based on Multivariate Analyses
    Sakai, Yuto
    Rinsaka, Koichiro
    Dohi, Tadashi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (07) : 1585 - 1592
  • [46] Gaussian process learning for cyber-attack early warning
    Zhang J.
    Porras P.
    Ullrich J.
    Statistical Analysis and Data Mining, 2010, 3 (01): : 56 - 68
  • [47] How to protect SCADA systems from cyber-attack
    Rush, William F.
    Kinast, John A.
    Gas Utility Manager, 2003, 47 (09): : 12 - 18
  • [48] The Research on Cyber-Attack Testbed With Hardware-In-Loop
    Fei, Jiaxuan
    Liu, Zengji
    Ma, Yuanyuan
    Huang, Xiuli
    Wang, Qi
    Tang, Yi
    2017 IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2017,
  • [49] Crossing the Rubicon: Identifying and Responding to an Armed Cyber-Attack
    Cal, Nerea M.
    2016 IEEE INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON U.S.), 2016, : 22 - 28
  • [50] Generation Z: Cyber-Attack Awareness Training Effectiveness
    White, Garry
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2022, 62 (03) : 560 - 571