2005
DOI: 10.1016/j.cose.2004.06.011
|View full text |Cite
|
Sign up to set email alerts
|

A taxonomy of network and computer attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
188
0
5

Year Published

2007
2007
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 333 publications
(209 citation statements)
references
References 3 publications
0
188
0
5
Order By: Relevance
“…A useful categorization for the purpose of this paper is the five criteria proposed by [8]. These criteria constitute a holistic and usable view of possible results from a WA attack.…”
Section: Results Of the Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…A useful categorization for the purpose of this paper is the five criteria proposed by [8]. These criteria constitute a holistic and usable view of possible results from a WA attack.…”
Section: Results Of the Attackmentioning
confidence: 99%
“…That is, the vulnerability can be known to the public at large. This is contingent to the taxonomy of Hansman and Hunt [8]. Vorobiev and Han [13], and Sidharth and Liu [12] propose that vulnerabilities can be found through querying the WA implementation of Universal Description, Discovery and Integration (UDDI) or Web Service Description Language (WSDL).…”
Section: Vulnerabilities and Exploitsmentioning
confidence: 99%
See 1 more Smart Citation
“…Data aggregation is also used to enhance bandwidth utilization [10,11]. But, this type of work treat all alerts equally without considering their criticalities, probably causing adverse impact on the system security.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we describe attacks from some of the different categories proposed in [74] and discuss how they can be detected with PeriodAnalyzer . Our examples are taken from an open access list of real-world SCADA attacks signatures used in the Quickdraw Intrusion Detection System 2 .…”
Section: Dealing With Real-world Attack Scenariosmentioning
confidence: 99%