2018
DOI: 10.33166/aetic.2018.02.001
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Approach for Network Attack Classification Based on Sequential Questions

Abstract: With the development of incipient technologies, user devices becoming more exposed and ill-used by foes. In upcoming decades, traditional security measures will not be sufficient enough to handle this huge threat towards distributed hardware and software. Lack of standard network attack taxonomy has become an indispensable dispute on developing a clear understanding about the attacks in order to have an operative protection mechanism. Present attack categorization techniques protect a specific group of threat … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2
2

Relationship

1
9

Authors

Journals

citations
Cited by 13 publications
(14 citation statements)
references
References 21 publications
0
14
0
Order By: Relevance
“…www.aetic.theiaer.org Since IoT is built on the foundation laid by the wireless sensor network (WSN) [30], characteristically each node of an IoT ecosystem is considered to be prone to attacks such as from the Distributed Denial-of-Service (DDoS) [31,32] threat and if compromised, it may serve as a point of failure. IoT networks are mostly leveraged on the cloud environment.…”
Section: Bc Enabled Enhanced Iot Securitymentioning
confidence: 99%
“…www.aetic.theiaer.org Since IoT is built on the foundation laid by the wireless sensor network (WSN) [30], characteristically each node of an IoT ecosystem is considered to be prone to attacks such as from the Distributed Denial-of-Service (DDoS) [31,32] threat and if compromised, it may serve as a point of failure. IoT networks are mostly leveraged on the cloud environment.…”
Section: Bc Enabled Enhanced Iot Securitymentioning
confidence: 99%
“…Motivations of the attacker model depends on the targeted IoT network. We consider an occasional hacker or a cybercriminal whose ressources remain moderate as per the definitions of motivations and attacker profiles provided by Mosenia and Jah [19] and Onik et al [20]. Given a target device invisible from the Internet and the capacities of the attacker model, the considered threats use one or multiple intermediate devices to reach the target device, and the source is either on the internet or in a local network.…”
Section: Threat Modelmentioning
confidence: 99%
“…As classification helps to differentiate attack surfaces and prepare accordingly [64], studies [7,9,10,17,65] have already analyzed app permissions for privacy threat modeling [66][67][68]. A study [69] states five ways of privacy breaching through the app permission system.…”
Section: Android Application Permission Associated Privacy Riskmentioning
confidence: 99%