Toward an Automated Attack Model for Red Teams

  • Authors:
  • Helayne T. Ray;Raghunath Vemuri;Hariprasad R. Kantubhukta

  • Affiliations:
  • SI Government Solutions;Motorola;Progressive Insurance

  • Venue:
  • IEEE Security and Privacy
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

To better understand system vulnerabilities, proactive security services use red teams that simulate malicious attacks. The authors contend that an attack model with UML-based use cases, sequence and state chart diagrams, and XML would best help red teams achieve attack automation.