2008 International Conference on Information Science and Security (ICISS 2008) 2008
DOI: 10.1109/iciss.2008.36
|View full text |Cite
|
Sign up to set email alerts
|

Active Cyber Attack Model for Network System's Vulnerability Assessment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…To properly assess the vulnerabilities, the network requires to face a simulated attack. In other words, a real synthetic attack scenario will occur in the network so that the potential breaches or vulnerabilities and the related defense mechanisms can be identified [ 28 ]. In this investigation of two general attack categories called physical attack and remote access attack, we simulate two attacks from these categories including object emulation attack and Botnet attack.…”
Section: Adversary Modelmentioning
confidence: 99%
“…To properly assess the vulnerabilities, the network requires to face a simulated attack. In other words, a real synthetic attack scenario will occur in the network so that the potential breaches or vulnerabilities and the related defense mechanisms can be identified [ 28 ]. In this investigation of two general attack categories called physical attack and remote access attack, we simulate two attacks from these categories including object emulation attack and Botnet attack.…”
Section: Adversary Modelmentioning
confidence: 99%
“…Network-based cyber attacks can be categorized as DoS attacks, DDoS attacks, sniffing attacks, spoofing attacks, and session-hijacking attacks (Eom, Jung, Han, & Park, 2009 We summarize here what we do know about North Korean cyber infrastructure, organizations, capabilities, and vulnerabilities based on recent research.…”
Section: Types Of Network Attacksmentioning
confidence: 99%
“…Specifically, some studies [21,22] report difficulties in applying a Common Vulnerability Scoring System (CVSS) as an industrial standard (i.e., a de facto standard) for quantifying security vulnerabilities in smart grid environment. Many techniques have been published, including various proposals for resolving the unsuitability of CVSS [23][24][25], but these techniques are limited in terms of their application to smart grid, which are particularly prone to damage (even at a national level) when an attack occurs, owing to the impossibility of extracting objective evaluation indicators from the various standards in each techniques [26][27][28][29][30][31][32][33][34].…”
Section: Introductionmentioning
confidence: 99%