By Topic

A new approach to developing attack taxonomies for network security - including case studies

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Hunt, R. ; Univ. of Canterbury, Christchurch, New Zealand ; Slay, J.

Taxonomies have been widely documented in the literature and a number of classical approaches exist. The main problem is that many of these approaches are very general and, for example, apply to all networks and computer systems. The intention of this paper is not to invent a new taxonomy architecture but to create a model which is adaptable to new types of networks and new attack vectors and which can then be applied and be of use in specific situations. When the “classical” taxonomies were developed systems such as cloud computing, 3G malware, VoIP and social engineering vulnerabilities were unheard of. This paper therefore proposes a model which can be readily adapted to be of value in attack classification and vulnerability detection for specific cases such as those illustrated above. Thus the model can be adapted to new types of networks, devices and systems as they evolve as well as being able to incorporate new attack categories and techniques and adapt to new types of protection mechanisms.

Published in:

Networks (ICON), 2011 17th IEEE International Conference on

Date of Conference:

14-16 Dec. 2011