Toward cost-sensitive modeling for intrusion detection and response
Journal of Computer Security
DEVS Simulation of distributed intrusion detection systems
Transactions of the Society for Computer Simulation International - Recent advances in DEVS Methodology--part I
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
Simulation of Network Security with Collaboration among IDS Models
AI '01 Proceedings of the 14th Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
NSDF: a computer network system description framework and its application to network security
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Systematic Approach to Multi-Stage Network Attack Analysis
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Using DAML+OIL to classify intrusive behaviours
The Knowledge Engineering Review
Reflections on Industry Trends and Experimental Research in Dependability
IEEE Transactions on Dependable and Secure Computing
A Management Perspective on Risk of Security Threats to Information Systems
Information Technology and Management
Handling and Reporting Security Advisories: A Scorecard Approach
IEEE Security and Privacy
A software flaw taxonomy: aiming tools at security
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
A systematic classification of cheating in online games
NetGames '05 Proceedings of 4th ACM SIGCOMM workshop on Network and system support for games
Expert Systems with Applications: An International Journal
Automated adaptive intrusion containment in systems of interacting services
Computer Networks: The International Journal of Computer and Telecommunications Networking
Defining categories to select representative attack test-cases
Proceedings of the 2007 ACM workshop on Quality of protection
Secretly monopolizing the CPU without superuser privileges
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Strategic planning for the computer science security
WSEAS Transactions on Computers
Classification of Component Vulnerabilities in Java Service Oriented Programming (SOP) Platforms
CBSE '08 Proceedings of the 11th International Symposium on Component-Based Software Engineering
Alert correlation survey: framework and techniques
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Security benchmarks of OSGi platforms: toward Hardened OSGi
Software—Practice & Experience
IAAI'05 Proceedings of the 17th conference on Innovative applications of artificial intelligence - Volume 3
Attacks against computer network: formal grammar-based framework and simulation tool
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
ICWE'03 Proceedings of the 2003 international conference on Web engineering
A network security analysis method using vulnerability correlation
ICNC'09 Proceedings of the 5th international conference on Natural computation
Towards a unified fault-detection benchmark
Proceedings of the 9th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering
A distributed and privacy-preserving method for network intrusion detection
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems: Part II
Review of software security defects taxonomy
RSKT'10 Proceedings of the 5th international conference on Rough set and knowledge technology
A new automatic intrusion response taxonomy and its application
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Malware characteristics and threats on the internet ecosystem
Journal of Systems and Software
Virtualization: Issues, security threats, and solutions
ACM Computing Surveys (CSUR)
An extensible pattern-based library and taxonomy of security threats for distributed systems
Computer Standards & Interfaces
Hi-index | 0.00 |
This paper presents a classification of intrusions with respect to technique as well as to result. The taxonomy is intended to be a step on the road to an established taxonomy of intrusions for use in incident reporting, statistics, warning bulletins, intrusion detection systems etc. Unlike previous schemes, it takes the viewpoint of the system owner and should therefore be suitable to a wider community than that of system developers and vendors only. It is based on data from a realistic intrusion experiment, a fact that supports the practical applicability of the scheme. The paper also discusses general aspects of classification, and introduces a concept called dimension. After having made a broad survey of previous work in the field, we decided to base our classification of intrusion techniques on a scheme proposed by Neumann and Parker in 1989 and to further refine relevant parts of their scheme. Our classification of intrusion results is derived from the traditional three aspects of computer security: confidentiality, availability and integrity.