Search Paper
  • Home
  • Login
  • Categories
  • Post URL
  • Academic Resources
  • Contact Us

 

Modelling Cyber Attacks

google+
Views: 9                 

Author :  Farida Chowdhury

Affiliation :  Shahjalal University of Science and Technology

Country :  Bangladesh

Category :  Software Engineering & Security

Volume, Issue, Month, Year :  9, 4, July, 2017

Abstract :


In this article, we present a model of cyber attacks which can be used to represent a cyber attack in an intuitive and concise way. With ever-increasing popularities of online services, we have seen a growing number of cyber attacks targeted towards large online service providers as well as individuals and the IoT devices. To mitigate these attacks, there is a strong urge to understand their different aspects. Creating a model is a widely used method towards this goal. Unfortunately, the number of models for cyber attacks is pretty low and even the existing models are not comprehensive. In this paper, we aim to fill this gap by presenting a comprehensive cyber attacks model. We have used this model to represent a wide range of cyber attacks and shown its applicability and usefulness. We believe that our model will be a useful tool for the formal analysis of cyber attacks.

Keyword :  Cyber Attacks, Modelling, Security

URL :  https://aircconline.com/ijnsa/V9N4/9417ijnsa02.pdf

User Name : Brendon Clarke
Posted 25-09-2024 on 17:31:12 AEDT



Related Research Work

  • Benchmarks For Evaluating Anomaly Based Intrusion Detection Solutions
  • A Wireless Fingerpring Attendance System
  • Location Privacy Online : China, The Netherlands And South Korea
  • A Method For Encrypting And Decrypting Wave Files

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals