2014 International Conference on High Performance Computing &Amp; Simulation (HPCS) 2014
DOI: 10.1109/hpcsim.2014.6903738
|View full text |Cite
|
Sign up to set email alerts
|

AIDD: A novel generic attack modeling approach

Abstract: Abstract-In recent years, information systems have become more diverse and complex making them a privileged target of network and computer attacks. These attacks have increased tremendously and turned out to be more sophisticated and evolving in an unpredictable manner. This work presents an attack model called AIDD (Attacks Identification Description and Defense). It offers a generic attack modeling to classify, help identify and defend against computer and network attacks. Our approach takes into account sev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
1
1

Relationship

3
2

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…In fact, we propose a generic approach to define Attack categories based on our attack classification [2]. These categories will be the base of our detection process.…”
Section: Aidd Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…In fact, we propose a generic approach to define Attack categories based on our attack classification [2]. These categories will be the base of our detection process.…”
Section: Aidd Architecturementioning
confidence: 99%
“…However, the current paper focuses only on the architectural aspects such as modularity, flexibility, extendibility, expressiveness, and simplicity of use in a heterogeneous environments. We have already dealt with modeling issues in a previous work [2]. The objective of this work is to bring a level of abstraction that makes the detection of complex attacks more feasible and the detection rules and security policy definition simpler.…”
Section: Introductionmentioning
confidence: 98%
“…Finally, we define a Detection Database that contains all the information needed: attack classification scheme, detection rules, Attack scenarios and queries. In fact, we propose a generic approach to define Attack categories based on our attack classification [2]. These categories will be the base of our detection process.…”
Section: B Aidd Architecturementioning
confidence: 99%
“…In our context, attack modeling is crucial to the detection process, as it is closely related to the choice of implemented rules and attack detection parameters. This was the topic of our previous work [2]. The current paper focuses only on the architectural aspects showing how to bring a level of abstraction to make the detection of complex attacks more feasible and the detection rules and security policy defining process simpler.…”
Section: Introductionmentioning
confidence: 99%
“…In our context, our proposal is based on an attack classification from the defender point of view [2] that helps describe the manifestation of the attack in a high level manner. Our proposed language describes an attack and associates the appropriate response according to the context and the defined security policy.…”
Section: Introductionmentioning
confidence: 99%