2004
DOI: 10.1007/978-3-540-30176-9_41
|View full text |Cite
|
Sign up to set email alerts
|

An Ontology for Network Security Attacks

Abstract: Abstract. We first consider network security services and then review threats, vulnerabilities and failure modes. This review is based on standard texts, using well-known concepts, categorizations, and methods, e.g. risk analysis using asset-based threat profiles and vulnerability profiles (attributes). The review is used to construct a framework which is then used to define an extensible ontology for network security attacks. We present a conceptualization of this ontology in figure 1.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0
2

Year Published

2008
2008
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 79 publications
(37 citation statements)
references
References 3 publications
0
25
0
2
Order By: Relevance
“…The most widely used ontology of security threats is the Confidentiality Integrity Availability (CIA) triad (Pfleeger & Pfleeger, 2002) which has been extended over the years. The extended ontology is referred to as the ''CIA Plus'' (CIA+) model (Simmonds, Sandilands & Van Ekert, 2004). In the course of reviewing the available literature and approaches to IoT security, we have created a proposed expansion of the existing framework that we believe works better in the IoT space.…”
Section: Approach and Methodologymentioning
confidence: 99%
“…The most widely used ontology of security threats is the Confidentiality Integrity Availability (CIA) triad (Pfleeger & Pfleeger, 2002) which has been extended over the years. The extended ontology is referred to as the ''CIA Plus'' (CIA+) model (Simmonds, Sandilands & Van Ekert, 2004). In the course of reviewing the available literature and approaches to IoT security, we have created a proposed expansion of the existing framework that we believe works better in the IoT space.…”
Section: Approach and Methodologymentioning
confidence: 99%
“…Some schemes can do better than passwords on security-as expected, given that inventors of alternatives to passwords tend to come from the security community. The concept of using combining functions to determine the combined effect of vulnerabilities in a network [12].Network security involves the authorization of access to data in a network, which is controlled by the network administrator [10]. Some schemes do better and some worse on usability-suggesting that the community needs to work harder there.…”
Section: Related Workmentioning
confidence: 99%
“…Data storage room wellbeing structures in flowed figuring an assortment of realistic strategies [2] have been broke down in this paper. Spread accumulating is viewed as a strategy of scattered server develops that everything considered make utilization of virtualization advancement and arrangements fringe for data putting away.…”
Section: Introductionmentioning
confidence: 99%
“…An ensured and fruitful putting away custom is arranged that confirmation the data amassing secret and dependability. The present convention is imagined by methods for the headway of elliptic curve cryptography and calm social event is utilized to demand the data honesty [2]. Data and programming technique convention pace executed by obscure customers to put in the affirmation essential structure to the thing and information before exchanging them to the cloud.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation