A TAXONOMY OF THE CYBER ATTACKS

Authors

  • Petar Boyanov Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences

DOI:

https://doi.org/10.46687/jsar.v3i1.73

Keywords:

Cyber attacks, Vulnerabilities, Unauthorized access, Computer and network security, Taxonomy

Abstract

In this paper is made a sophisticated taxonomy of the malicious cyber attacks. The cyber attacks are summarized into several mainly types with additional subtypes for everyone attack. Thanks to the achieved comparative results in this paper many users can find and analyze different flaws and vulnerabilities in their computer and network systems and thereby they could detect and prevent future malicious cyber attacks.

Author Biography

Petar Boyanov, Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences

Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences

References

Avizienis, Algirdas,. Laprie J-C., Randell Brian., and Landwehr Carl., "Basic concepts and taxonomy of dependable and secure computing." Dependable and Secure Computing, IEEE Transactions on 1, no. 1 (2004): 11-33

Bråthen A., "Correlating IDS alerts with system logs by means of a network-centric SIEM solution." (2011).

Collins M., Gates C., and Kataria G., "A model for opportunistic network exploits: The case of P2P worms." In Workshop on the Economics of Information Security (WEIS), University of Cambridge, UK. 2006.

De Vries J. A., Warnier M. E., and Hoogstraaten H., "Towards a roadmap for development of intelligent data analysis based cyber attack detection systems." (2012).

Friedman J., and Hoffman D. V., "Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses." Information, Knowledge, Systems Management 7, no. 1 (2008): 159-180

Hajian S., And Hendessi Faramarz B M., "A Taxonomy for network vulnerabilities." International Journal Of Information And Communication Technology (Ijict) (2010).

Hansman S., and Hunt R., "A taxonomy of network and computer attack methodologies." Retrieved March 22 (2003): 2007.

Hansman S., and Hunt R., "A taxonomy of network and computer attacks." Computers & Security 24, no. 1 (2005): 31-43.

Howard J. D., An analysis of security incidents on the Internet 1989-1995. CARNEGIE-MELLON UNIV PITTSBURGH PA, 1997.

Howard J. D., and Longstaff T. A., "A common language for computer security incidents." Sandia Report: SAND98-8667, Sandia National Laboratories, http://www. cert. org/research/taxonomy_988667. pdf (1998).

Igure V., and Williams R., "Taxonomies of attacks and vulnerabilities in computer systems." Communications Surveys & Tutorials, IEEE 10, no. 1 (2008): 6-19

Климовский А. А., "Таксономия кибератак и ее применение к задаче формирования сценариев их проведения." Труды Института системного анализа Российской академии наук 27 (2006): 74-107.

Kjaerland M., "A taxonomy and comparison of computer security incidents from the commercial and government sectors." Computers & Security 25.7 (2006): 522-538.

Lipson H. F., "Tracking and tracing cyber-attacks: Technical challenges and global policy issues." (2002).

Lough D. L., (2001). A taxonomy of computer attacks with applications to wireless networks (Doctoral dissertation).

Myers C., Powers S., and Faissol D., "Taxonomies of cyber adversaries and attacks: a survey of incidents and approaches." Lawrence Livermore National Laboratory (April 2009) 7 (2009).

Meyers C., Powers S., and Faissol D., Probabilistic Characterization of Adversary Behavior in Cyber Security. No. LLNL-TR-419023. Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2009.

Mishra B. K., and Saini H., "Cyber Attack Classification using Game Theoretic Weighted Metrics Approach." (2009).

Monahan-Pendergast, MaryTheresa. "Attack Evolution: Identifying Attack Evolution Characteristics to Predict Future Attacks." PhD diss., 2006.

Nasr K., El Kalam A. A., and Fraboul., "Generating Representative Attack Test Cases for Evaluating and Testing Wireless Intrusion Detection Systems." International Journal of Network Security & Its Applications (IJNSA) 4, no. 3 (2012): 1-19.

Nunes S. R., "Web attack risk awareness with lessons learned from high interaction honeypots." PhD diss., CARNEGIE MELLON UNIVERSITY, 2009.

Rutkowska J., "Introducing stealth malware taxonomy." COSEINC Advanced Malware Labs (2006).

Saber M., Bouchentouf T., Benazzi A., and Azizi M., "Amelioration of attack classifications for evaluating and testing intrusion detection system." Journal of Computer Science 6, no. 7 (2010):716-722

Sharma A., Kalbarczyk Z., Iyer R., and Barlow J., "Analysis of credential stealing attacks in an open networked environment." In Proc. of the Fourth International Conference on Network and System Security. Washington, DC, USA: IEEE Computer Society, pp. 144-151. 2010.

Simmons C., Shiva S., Dasgupta D., and Wu Q., "AVOIDIT: A cyber attack taxonomy." University of Memphis, Technical Report CS-09-003 (2009).

Singh P. K., Vatsa A. K., Sharma R., & Tyagi P., "Taxonomy based intrusion attacks and Detection management scheme in peer-to-peer network", International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.5, September 2012

Specht S M., and R. B. Lee., "Distributed denial of service: Taxonomies of attacks, tools, and countermeasures." In Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems, pp. 543-550. 2004.

Stiawan D., "Network Security Violation: a review."

Ye N., Newman C., and Farley T., "A system-fault-risk framework for cyber attack classification." Information, Knowledge, Systems Management 5, no. 2 (2006): 135-151

Van Heerden R. P., Irwin B., and Burke I. D., "Classifying network attack scenarios using an Ontology." Academic Conferences Limited, 2012

Downloads

Published

05.03.2023

How to Cite

Boyanov, P. (2023). A TAXONOMY OF THE CYBER ATTACKS. JOURNAL SCIENTIFIC AND APPLIED RESEARCH, 3(1), 114–124. https://doi.org/10.46687/jsar.v3i1.73

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 9 > >>