We first consider network security services and then review threats, vulnerabilities and failure modes. This review is based on standard texts, using well-known concepts, categorizations, and methods, e.g. risk analysis using asset-based threat profiles and vulnerability profiles (attributes). The review is used to construct a framework which is then used to define an extensible ontology for network security attacks. We present a conceptualization of this ontology in figure 1. Keywords: network, cyber, security, ontology, attack, threat, vulnerability, failure
The prediction of attacks is essential for the prevention of potential risk. Therefore, risk forecas...
Software applications become highly distributed and complex, involving independent collaborating com...
Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers expl...
One of the most popular attack vectors against computers are their network connections. Attacks on c...
AbstractAs the computer network has evolved to provide the user many services, the attacks on these ...
This paper presents a methodology using network attack ontology to classify computer-based attacks. ...
Abstract — Intrusion Detection Systems are tools used to detect attacks against networks. Many of th...
Software systems have become highly distributed and complex involving independent components working...
The integration of networks within an organization made many critical infrastructures (CI) and their...
Prevention of exploits requires timely intelligence about the cybersecurity vulnerabilities and thre...
Cyber attack nowadays is increasingly being reported. Defenders need a good understanding of attacke...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
Ontologies are a field within semantic technologies concerned with modeling knowledge of a domain th...
Considering the continuous growth in the complexity of both information systems and security informa...
This paper proposes an effective approach to model DDoS attacks, and its application to recognize at...
The prediction of attacks is essential for the prevention of potential risk. Therefore, risk forecas...
Software applications become highly distributed and complex, involving independent collaborating com...
Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers expl...
One of the most popular attack vectors against computers are their network connections. Attacks on c...
AbstractAs the computer network has evolved to provide the user many services, the attacks on these ...
This paper presents a methodology using network attack ontology to classify computer-based attacks. ...
Abstract — Intrusion Detection Systems are tools used to detect attacks against networks. Many of th...
Software systems have become highly distributed and complex involving independent components working...
The integration of networks within an organization made many critical infrastructures (CI) and their...
Prevention of exploits requires timely intelligence about the cybersecurity vulnerabilities and thre...
Cyber attack nowadays is increasingly being reported. Defenders need a good understanding of attacke...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
Ontologies are a field within semantic technologies concerned with modeling knowledge of a domain th...
Considering the continuous growth in the complexity of both information systems and security informa...
This paper proposes an effective approach to model DDoS attacks, and its application to recognize at...
The prediction of attacks is essential for the prevention of potential risk. Therefore, risk forecas...
Software applications become highly distributed and complex, involving independent collaborating com...
Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers expl...