2008
DOI: 10.1109/comst.2008.4483667
|View full text |Cite
|
Sign up to set email alerts
|

Taxonomies of attacks and vulnerabilities in computer systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
55
0
1

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 109 publications
(56 citation statements)
references
References 44 publications
0
55
0
1
Order By: Relevance
“…A comprehensive analysis of security-related taxonomies published between 1974 and 2006 was given by Igure and Williams (Igure & Williams, 2008). There, two main groups are built, attack-and vulnerability-related taxonomies.…”
Section: Overview Of Current Taxonomiesmentioning
confidence: 99%
See 1 more Smart Citation
“…A comprehensive analysis of security-related taxonomies published between 1974 and 2006 was given by Igure and Williams (Igure & Williams, 2008). There, two main groups are built, attack-and vulnerability-related taxonomies.…”
Section: Overview Of Current Taxonomiesmentioning
confidence: 99%
“…For example, Neumann presented a taxonomy based on 26 kinds of attacks which were grouped into nine categories like hardware misuses, bypasses and active misuse. Anyway, because of the lack of a common dimension, it is possible that other attack classes could have been left out (Igure & Williams, 2008). Because of that, Lindquist and Johnson used the attack result for the arrangement of attacks and built three classes, namely exposure, DoS and erroneous output.…”
Section: Overview Of Current Taxonomiesmentioning
confidence: 99%
“…6 Going back to our Systema Naturae analogy, it is almost as if the efforts in taxonomy so far have looked at classifying all Equidae and Canidae. To define a complete taxonomy, we will need to take a few steps back to get the big picture.…”
Section: Introductionmentioning
confidence: 99%
“…They found none but identified features useful in such a taxonomy. 6 The Common Vulnerabilities and Exposures list 7 provides a unique id for every known vulnerability; however, this taxonomy only tells us the year that a vulnerability was discovered. It provides a fine key into the database but does not help classify the problem in any meaningful way.…”
Section: Introductionmentioning
confidence: 99%
“…Many of the current efforts in security assessment involve searching for known vulnerabilities [2]. Computer controlled systems should be subjected to scrutiny and this is often ignored at the management level.…”
Section: Scada Security For Field Devicesmentioning
confidence: 99%