2014
DOI: 10.2495/safe-v4-n2-97-115
|View full text |Cite
|
Sign up to set email alerts
|

Modeling attacks

Abstract: The aim of this paper is to develop a general conceptual model of attack progression that can be applied to modeling of computer and communication threat risks. This paper focuses on attacks that aim at overpowering the victim/prey to gain some benefi t. It examines existing models and introduces a new fl ow model to facilitate development of a general model of two-sided combat. The symmetry between the attacker's and defender's fl ow systems of signals, information, plans, decisions, and actions results in a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 1 publication
0
7
0
Order By: Relevance
“…Section 3 introduces a diagrammatic language (see refs. [21]- [28]) as a vehicle for depicting security machines with illustrative examples that are a new contribution. Section 4 utilizes this language to model the security aspects of the case study.…”
Section: Contribution Of This Paper: a New Approach To Modelling Physmentioning
confidence: 99%
“…Section 3 introduces a diagrammatic language (see refs. [21]- [28]) as a vehicle for depicting security machines with illustrative examples that are a new contribution. Section 4 utilizes this language to model the security aspects of the case study.…”
Section: Contribution Of This Paper: a New Approach To Modelling Physmentioning
confidence: 99%
“…FM has been utilized in many applications [9][10][11][12]. The example constructed at the end of the section is a new contribution.…”
Section: Flowthing Modelmentioning
confidence: 99%
“…This processing triggers (5) the creation (6) of ordered elements, an order that flows to the company system (7), where it is processed (8) to trigger (9) a Review of items (10). The Review flows (11) to the customer, where it is processed (12) to trigger (13) the creation of not approved (14) or approved (15). Not approved triggers the process to start again by sending another catalog to the customer (16).…”
Section: Fm Approach To Databases Development Workflowsmentioning
confidence: 99%
“…Other examples of hardware attacks include data remanence [27], [28] and failure analysis [29]- [31]. Additional attacks are discussed in [1]- [4], [32]- [35].…”
Section: Introductionmentioning
confidence: 99%