Proceedings From the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.
DOI: 10.1109/iaw.2004.1437840
|View full text |Cite
|
Sign up to set email alerts
|

Classification of computer attacks using a self organizing map

Abstract: As computer technology evolves and the threat of computer crimes increases, the apprehension and preemption of such violations become more and more diffi cult and challenging. To date, it appears that completely preventing breaches of security is unrealistic. Therefore, we must try to detect and classify these intrusions as they occur so that immediate actions may be taken to repair the damage and prevent/urther harm. One attempt at classifying these intrusions is MITRE's Common Vulnerabilities and Exposures (… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
4
0

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 4 publications
1
4
0
Order By: Relevance
“…Howard (1998) provides a results-oriented classification scheme that also identifies four basic categories: corruption of information, disclosure of information, theft of service, and denial of service. Other similar classifications appear in DeLooze (2004) and Kemmerer and Vigna (2002).…”
Section: A Conceptual Model Of the Iscp A Typology Of Security Incidentssupporting
confidence: 55%
“…Howard (1998) provides a results-oriented classification scheme that also identifies four basic categories: corruption of information, disclosure of information, theft of service, and denial of service. Other similar classifications appear in DeLooze (2004) and Kemmerer and Vigna (2002).…”
Section: A Conceptual Model Of the Iscp A Typology Of Security Incidentssupporting
confidence: 55%
“…In the research of the automatic vulnerability categorization, Ref. [27]- [30] used the clustering algorithm to classify vulnerabilities without supervision. These works discussed how to find the hidden mode automatically.…”
Section: Automatic Vulnerability Categorizationmentioning
confidence: 99%
“…Threat taxonomies (Álvarez & Petrovic, 2003;Chakrabarti & Manimaran, 2002;DeLooze, 2004;Lindqvist & Jonsson, 1997;Simmonds, Sandilands, & van Ekert, 2004;Welch & Lathrop, 2003) are rich and welldeveloped. There is even a rudimentary threat ontology, but it is not available online anymore (Undercoffer et al, 2004).…”
Section: Related Workmentioning
confidence: 99%