Proceedings of the 2003 ACM workshop on Rapid malcode
Short Paper: bufSTAT - a tool for early detection and classification of buffer overflow attacks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Communications of the ACM
The New Front Line: Estonia under Cyberassault
IEEE Security and Privacy
An overview of cyber attack and computer network operations simulation
Proceedings of the 2011 Military Modeling & Simulation Symposium
A taxonomy of cyber attacks on 3g networks
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Feature: A review of L0phtCrack 6
Network Security
An overview of cyber attack and computer network operations simulation
Proceedings of the 2011 Military Modeling & Simulation Symposium
Hi-index | 0.00 |
Due to an increasing level of reliance on computer network technology, military organizations are increasingly vulnerable to cyber attacks. Cyber attacks take a variety of forms and have a broad spectrum of effects. In order to facilitate military cyber operators' and defenders' understanding of the threats they face, we propose a taxonomy of cyber attacks based on the level of access required by the attacker to launch the attack. We also discuss a number of methods used to deliver cyber attacks to target systems. Finally, we propose methods to simulate the effects of several cyber attack types for use in simulation in support of training and experimentation.