2018
DOI: 10.1016/j.cose.2017.04.007
|View full text |Cite
|
Sign up to set email alerts
|

A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(15 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…General Model: To propose a protection model, the following elements were taken from the references: the qualitative criteria of cyberattack were considered [24]; user behavior was considered for access control [29]; the criteria of levels of responsibility were adopted [37]; the application of security policies was considered [39]; [31] and the [36] use of phases for attack and response detection was considered.…”
Section: Methodology To Generate Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…General Model: To propose a protection model, the following elements were taken from the references: the qualitative criteria of cyberattack were considered [24]; user behavior was considered for access control [29]; the criteria of levels of responsibility were adopted [37]; the application of security policies was considered [39]; [31] and the [36] use of phases for attack and response detection was considered.…”
Section: Methodology To Generate Resultsmentioning
confidence: 99%
“…The authors reviewed the attack by malware in the banking sector, where criminal groups steal information; they used an analysis framework for decomposition, control flow study and instruction review; they concluded that there is a need to understand malware tactics at a high level [23]. The authors carried out a cyberattack evaluation model, based on a normative scheme of the United Nations "force use" letters of 1945; some parameters are difficulty, speed, causes, number of operations, identification of consequences, relations between operations and permitted acts; their strategy is in a new calculation to measure the criteria, where they combined algorithms and new grouping of reasons to obtain a destruction value [24].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Measuring the performance of attribution attacks is an open issue although several methods have been proposed [37]. The development of modelling strategies for evaluating cyber attacks [38] are also important. Cook et al [39] have used six individual metrics, as summarized in Table 1, to measure the effectiveness of each attribution in the context of ICS that can be applied to CIs.…”
Section: Attribution Of Cyber Attacksmentioning
confidence: 99%
“…The new trends and risks are based on scenarios and in real time, where the business processes need to be executed under certain norms and good practices, which guarantee the reliability and availability of information [10,11]. As for the growth and sophistication of cyber-attacks, new scenarios have been presented in the face of certain security incidents, where control and reduction of response times are key aspects [12,13]. Therefore, it needs to be emphasized, that the technologies associated with BI have been growing and gaining improved positioning in certain techniques such as Data Mining and DW.…”
Section: Related Workmentioning
confidence: 99%