2001
DOI: 10.21236/ada387544
|View full text |Cite
|
Sign up to set email alerts
|

Attack Modeling for Information Security and Survivability

Abstract: Use of any trademarks in this report is not intended in any way to infringe on the rights of the trademark holder. Internal use. Permission to reproduce this document and to prepare derivative works from this document for internal use is granted, provided the copyright and "No Warranty" statements are included with all reproductions and derivative works.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
128
0
6

Year Published

2005
2005
2014
2014

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 204 publications
(134 citation statements)
references
References 0 publications
0
128
0
6
Order By: Relevance
“…These solutions generate accurate results as compare with other simulation based solutions and attacks within SCADA stations are analyzed and test in real (laboratory) environment (Giani et al, 2008). Several attacks scenarios such as "denial of service attacks, integrity attacks, phishing attacks" are implemented to check the integrity and availability of SCADA communication between field devices and performance impacts on entire system (NSTB, 2009;Moore et al, 2001). …”
Section: Scada Vulnerabilities Potential Thread/attacks and Recommenmentioning
confidence: 99%
“…These solutions generate accurate results as compare with other simulation based solutions and attacks within SCADA stations are analyzed and test in real (laboratory) environment (Giani et al, 2008). Several attacks scenarios such as "denial of service attacks, integrity attacks, phishing attacks" are implemented to check the integrity and availability of SCADA communication between field devices and performance impacts on entire system (NSTB, 2009;Moore et al, 2001). …”
Section: Scada Vulnerabilities Potential Thread/attacks and Recommenmentioning
confidence: 99%
“…(Dawkins et al 2002, IEC1025 1999, Moore et al 2001. For each component, three security attributes exist:…”
Section: The Infrastructure Hypergraphmentioning
confidence: 99%
“…Attack trees have been previously proposed [2,8,11,12] as a systematic method to specify system security based on varying attacks. They help organize intrusion and/or misuse scenarios by 1. utilizing known vulnerabilities and/or weak spots in the system, and 2. analyzing system dependencies and weak links and representing these dependencies in the form of an And-Or tree.…”
Section: Modeling Attacks Using Attack Treesmentioning
confidence: 99%