2012
DOI: 10.9756/bijrce.1132
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on System Attack Models

Abstract: Abstract---

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…This kind of attack would be possible due to vulnerabilities V1-V4 and V6-V7. By exploiting these vulnerabilities, the attackers can follow a deceptive attack model (Ajay, 2012), where deception can be defined as an interaction between two parties, a deceiver and a target, in which the deceiver successfully causes the target to accept as true a specific incorrect version of reality, with the intent of causing the target to act in a way that benefits the deceiver (Teixeira et al, 2012). A specific class of deception attack is the false-data injection attack (Teixeira et al, 2012), where the attacker would inject false data into the INTER-TRUST framework.…”
Section: The Attack Modelmentioning
confidence: 99%
“…This kind of attack would be possible due to vulnerabilities V1-V4 and V6-V7. By exploiting these vulnerabilities, the attackers can follow a deceptive attack model (Ajay, 2012), where deception can be defined as an interaction between two parties, a deceiver and a target, in which the deceiver successfully causes the target to accept as true a specific incorrect version of reality, with the intent of causing the target to act in a way that benefits the deceiver (Teixeira et al, 2012). A specific class of deception attack is the false-data injection attack (Teixeira et al, 2012), where the attacker would inject false data into the INTER-TRUST framework.…”
Section: The Attack Modelmentioning
confidence: 99%