Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

ADMIT- A Five Dimensional Approach towards Standardization of Network and Computer Attack Taxonomies

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 100 - Number 5
Year of Publication: 2014
Authors:
Chanchala Joshi
Umesh Kumar Singh
10.5120/17524-8091

Chanchala Joshi and Umesh Kumar Singh. Article: ADMIT- A Five Dimensional Approach towards Standardization of Network and Computer Attack Taxonomies. International Journal of Computer Applications 100(5):30-36, August 2014. Full text available. BibTeX

@article{key:article,
	author = {Chanchala Joshi and Umesh Kumar Singh},
	title = {Article: ADMIT- A Five Dimensional Approach towards Standardization of Network and Computer Attack Taxonomies},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {100},
	number = {5},
	pages = {30-36},
	month = {August},
	note = {Full text available}
}

Abstract

This paper proposed a five dimensional taxonomy ADMIT which captures five major classifiers to characterize the nature of attacks. These are classification by attack vector, classification by defense, classification by method, classification by impact and classification by attack target. The classification structure of proposed taxonomy described the nature of attacks thoroughly. The administrator can use the proposed taxonomy to locate strategies that are appropriate for securing their system against vulnerabilities that can be exploited. Use of ADMIT taxonomy in network defense strategies can improve the overall level of security.

References

  • Hansman, S. , Hunt R. , "A taxonomy of network and computer attacks". Computer and Security, vol. 24, issue 1, Feb 2005, PP. 31-43.
  • Simmons, C. , Ellis, C. , Shiva, S. , Dasgupta, D. , & Wu, Q. "AVOIDIT: A Cyber Attack Taxonomy", University of Memphis, Technical Report CS-09-003, 2009. [Online]. Available: http://issrl. cs. memphis. edu/?les/papers/CyberAttackTaxonomy IEEE Mag. pdf
  • R. P. Abbott et al, "Security Analysis and Enhancements of Computer Operating Systems," Report NBSIR 76-1041, Institute for Computer Science and Technology, Natl. Bur. of Stnds, Apr. 1976.
  • Bisbey, R. and D. Hollingsworth, "Protection Analysis Project Final Report, "Information Sciences Institute, University of Southern California, Marina Del Rey, CA, 1978.
  • T. Aslam, "A taxonomy of Security Faults in the Unix Operating System," M. S. Thesis, Purdue University, 1995.
  • T. Aslam, "Use of a taxonomy of Security Faults," Technical Report 96-05, COAST Laboratory, Department of Computer Science, Purdue University, March 1996.
  • I. Krsul, "Software Vulnerability Analysis," Ph. D. dissertation, Purdue Univ. , 1998.
  • M. Bishop, "A Taxonomy of UNIX System and Network Vulnerabilities," Technical Report CSE-95-10, Purdue University, May 1995.
  • Howard, John D. and Longstaff, Thomas A. "A Common Language for Computer Security Incidents," Technical report, Sandia National Laboratories, Oct. 1998.
  • Kjaerland, M. , "A taxonomy and comparison of computer security incidents from the commercial and government sectors". Computers and Security, Volume 25, Issue 7, October 2006, PP 522–538.
  • Lough, Daniel. "A Taxonomy of Computer Attacks with Applications to Wireless Networks," PhD thesis, Virginia Polytechnic Institute and State University, 2001.
  • Scott D. , Angelos S," Towards a Cyber Conflict Taxonomy", 5th International Conference on Cyber Conflict K. Podins, J. Stinissen, M. Maybaum (Eds. ), 2013.
  • E. G. Amoroso, "Fundamentals of Computer Security Technology", Upper Saddle River, NJ: Prentice-HallPTR, 1994.
  • Anthony D. Wood, John A. Stankovic, "A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks," Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, CRC Press, 2004.
  • C. Douligeris and A. Mitrokotsa, "DDoS Attacks and Defense Mechanisms: Classification and State-of-theart," Comp. Networks, Volume 44, Issue 5, April 2004, PP 643–666
  • David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford and Nicholas Weaver. "Inside the slammer worm", IEEE Security and Privacy, volume 1, 2003, PP 33-39.
  • William A. Arbaugh, William L. Fithen, and John McHugh, "Windows of Vulnerability: A Case Study Analysis", IEEE Computer, 33, issue 12, Dec. 2000, PP 52-59.
  • CERT Coordination Center, "CERT Advisory CA-2003-20 W32/Blaster worm," Aug. 2003; www. cert. org/advisories/CA-2003-20. html.