2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) 2016
DOI: 10.1109/w-ficloud.2016.29
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Attack Modeling Analysis Techniques: An Overview

Abstract: To see the final version of this work please visit the publisher's website. Access to the published online version may require a subscription.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
28
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 76 publications
(39 citation statements)
references
References 9 publications
0
28
0
Order By: Relevance
“…These modelling techniques can be used individually or in conjunction with other models. An overview can be found in Al-Mohannadi et al [2], which describes a number of cyber-attack modelling techniques developed to handle cyber attacks. Cyber-attack modelling techniques mainly concerned with identifying the attack patterns of the adversary but limited to provide an early intelligence before attack event.…”
Section: Related Workmentioning
confidence: 99%
“…These modelling techniques can be used individually or in conjunction with other models. An overview can be found in Al-Mohannadi et al [2], which describes a number of cyber-attack modelling techniques developed to handle cyber attacks. Cyber-attack modelling techniques mainly concerned with identifying the attack patterns of the adversary but limited to provide an early intelligence before attack event.…”
Section: Related Workmentioning
confidence: 99%
“…Several cyberattack models have been analyzed in detail to help understand the vulnerability of NCSs. 38 In the work of Teixeira et al, 39 according to different implementations, cyberattacks are roughly divided into two types: (1) one is deception attacks, which destroy the controllability of system by injecting attack signals into the communication channel to modify the data packet, and (2) the other is denial of service (DoS), which destroys the availability of data and causes signal congestion and even blocking. In particular, stochastic cyberattacks are a kind of deception attacks whose appearance in the system is random and can be characterized by probability models.…”
Section: Introductionmentioning
confidence: 99%
“…Al-Mohannadi et al [7] provided an insight into Cyber-attack modeling techniques. This review advances a significant array of and sheds further light on cyber-attack modeling.…”
Section: Introductionmentioning
confidence: 99%