The aim of this article is to present an approach to develop and verify a method of formal modeling of cyber threats directed at computer systems. Moreover, the goal is to prove that the method enables one to create models resembling the behavior of malware that support the detection process of selected cyber attacks and facilitate the application of countermeasures. The most common cyber threats targeting end users and terminals are caused by malicious software, called malware. The malware detection process can be performed either by matching their digital signatures or analyzing their behavioral models. As the obfuscation techniques make the malware almost undetectable, the classic signature-based anti-virus tools must be supported with b...
The detection and defense of malicious attacks are critical to the proper functioning of network sec...
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited...
International audienceWeb services provide a general basis of convenient access and operation for cl...
The aim of this article is to present an approach to develop and verify a method of formal modeling ...
Part 9: Various Aspects of Computer SecurityInternational audienceWe propose a solution which provid...
Abstract—Behavior based intrusion detection technologies are increasingly popular. Traditionally beh...
Abstract—The researches have shown that not all the Petri Net machines can be used to describe attac...
This study proposes a stochastic Petri net model for evaluating the security and resilience of cyber...
This paper describes a generic model of matching that can be usefully applied to misuse intrusion de...
Abstract—Formal methods are often used to prove prop-erties of network protocols, including required...
This article presents a new method of risk propagation among associated elements. On thebasis of col...
Master's thesis in Computer scienceIn recent years, network has penetrated into every aspect of our ...
As the continuous increase of environment issues and energy demand for recent decades, the deeper de...
The paper presents a tool for verifying, during the system security design, security properties of d...
Threat modeling plays an important role in the deployment of optimal security controls and a number ...
The detection and defense of malicious attacks are critical to the proper functioning of network sec...
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited...
International audienceWeb services provide a general basis of convenient access and operation for cl...
The aim of this article is to present an approach to develop and verify a method of formal modeling ...
Part 9: Various Aspects of Computer SecurityInternational audienceWe propose a solution which provid...
Abstract—Behavior based intrusion detection technologies are increasingly popular. Traditionally beh...
Abstract—The researches have shown that not all the Petri Net machines can be used to describe attac...
This study proposes a stochastic Petri net model for evaluating the security and resilience of cyber...
This paper describes a generic model of matching that can be usefully applied to misuse intrusion de...
Abstract—Formal methods are often used to prove prop-erties of network protocols, including required...
This article presents a new method of risk propagation among associated elements. On thebasis of col...
Master's thesis in Computer scienceIn recent years, network has penetrated into every aspect of our ...
As the continuous increase of environment issues and energy demand for recent decades, the deeper de...
The paper presents a tool for verifying, during the system security design, security properties of d...
Threat modeling plays an important role in the deployment of optimal security controls and a number ...
The detection and defense of malicious attacks are critical to the proper functioning of network sec...
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited...
International audienceWeb services provide a general basis of convenient access and operation for cl...