SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Al-Fedaghi S, Moein S. Int. J. Saf. Secur. Eng. 2014; 4(2): 97-115.

Copyright

(Copyright © 2014, WIT Press)

DOI

10.2495/SAFE-V4-N2-97-115

PMID

unavailable

Abstract

The aim of this paper is to develop a general conceptual model of attack progression that can be applied to modeling of computer and communication threat risks. This paper focuses on attacks that aim at overpowering the victim/prey to gain some benefit. It examines existing models and introduces a new flow model to facilitate development of a general model of two-sided combat. The symmetry between the attacker's and defender's flow systems of signals, information, plans, decisions, and actions results in a single combat model incorporating the realms of both attacker and defender. Based on this conceptualization, it is possible to characterize the weak points and develop a map of vulnerabilities in the defender's system. Such a methodology of attack modeling provides a base for analysis in the fields of threat modeling and secure software development. Finally, this new model is applied to an SQL injection problem in web services to demonstrate implementation of a real system problem. Keywords

Attacks, conceptual model, security, SQL injection, threat risk


Language: en

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print