
@article{ref1,
title="Modeling attacks",
journal="International journal of safety and security engineering",
year="2014",
author="Moein, Samer and Al-Fedaghi, S.",
volume="4",
number="2",
pages="97-115",
abstract="The aim of this paper is to develop a general conceptual model of attack progression that can be applied to modeling of computer and communication threat risks. This paper focuses on attacks that aim at overpowering the victim/prey to gain some benefit. It examines existing models and introduces a new flow model to facilitate development of a general model of two-sided combat. The symmetry between the attacker's and defender's flow systems of signals, information, plans, decisions, and actions results in a single combat model incorporating the realms of both attacker and defender. Based on this conceptualization, it is possible to characterize the weak points and develop a map of vulnerabilities in the defender's system. Such a methodology of attack modeling provides a base for analysis in the fields of threat modeling and secure software development. Finally, this new model is applied to an SQL injection problem in web services to demonstrate implementation of a real system problem. Keywords  Attacks, conceptual model, security, SQL injection, threat risk<p /> <p>Language: en</p>",
language="en",
issn="2041-9031",
doi="10.2495/SAFE-V4-N2-97-115",
url="http://dx.doi.org/10.2495/SAFE-V4-N2-97-115"
}