메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 157-168

Modeling and execution of complex attack scenarios using interval timed colored petri nets

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER SIMULATION; DISTRIBUTED COMPUTER SYSTEMS; LARGE SCALE SYSTEMS; MATHEMATICAL MODELS; MULTI AGENT SYSTEMS; SECURITY OF DATA; STOCHASTIC CONTROL SYSTEMS;

EID: 33750946796     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IWIA.2006.17     Document Type: Conference Paper
Times cited : (26)

References (37)
  • 4
    • 0030092390 scopus 로고    scopus 로고
    • Checking for race conditions in file accesses
    • M. Bishop and M. Dilger. Checking for Race Conditions in File Accesses. Computing Systems, 9(2): 131-152, 1996.
    • (1996) Computing Systems , vol.9 , Issue.2 , pp. 131-152
    • Bishop, M.1    Dilger, M.2
  • 5
    • 33750963207 scopus 로고
    • Technical Report ISI/RR-75-31, University of Southern California Information Sciences Institute, Marina del Rey, CA, USA, June
    • J. Carlstedt, R. Bisbey, and G. Popek. Pattern-Directed Protection Evaluation. Technical Report ISI/RR-75-31, University of Southern California Information Sciences Institute, Marina del Rey, CA, USA, June 1975.
    • (1975) Pattern-directed Protection Evaluation
    • Carlstedt, J.1    Bisbey, R.2    Popek, G.3
  • 6
    • 85017067350 scopus 로고    scopus 로고
    • Real-time protocol analysis for detecting link-state routing protocol attacks
    • Feb.
    • H.-Y. Chang, S. R Wu, and Y. F. Jou. Real-Time Protocol Analysis for Detecting Link-State Routing Protocol Attacks. ACM Transactions on Information and System Security, 4(1): 1-36, Feb. 2001.
    • (2001) ACM Transactions on Information and System Security , vol.4 , Issue.1 , pp. 1-36
    • Chang, H.-Y.1    Wu, S.R.2    Jou, Y.F.3
  • 11
    • 84974763338 scopus 로고
    • Towards a theory of penetration-resistant systems and its applications
    • S. Gupta and V. D. Gligor. Towards a Theory of Penetration-Resistant Systems and Its Applications. Journal of Computer Security, 1(2): 133-158, 1992.
    • (1992) Journal of Computer Security , vol.1 , Issue.2 , pp. 133-158
    • Gupta, S.1    Gligor, V.D.2
  • 14
    • 0003871155 scopus 로고    scopus 로고
    • Monographs in Theoretical Computer Science. Springer Verlag, Heidelberg, Germany
    • K. Jensen. Coloured Petri Nets: Basic Concepts (Volume 1). Monographs in Theoretical Computer Science. Springer Verlag, Heidelberg, Germany, 1997.
    • (1997) Coloured Petri Nets: Basic Concepts (Volume 1)
    • Jensen, K.1
  • 15
    • 0003871155 scopus 로고    scopus 로고
    • Monographs in Theoretical Computer Science. Springer Verlag, Heidelberg, Germany
    • K. Jensen. Coloured Petri Nets: Practical Use (Volume 3). Monographs in Theoretical Computer Science. Springer Verlag, Heidelberg, Germany, 1997.
    • (1997) Coloured Petri Nets: Practical Use (Volume 3)
    • Jensen, K.1
  • 16
    • 0032153859 scopus 로고    scopus 로고
    • Compositional verification of concurrent systems using petri-net-based condensation rules
    • Sept.
    • E. Y. T. Juan, J. J. P. Tsai, and T. Murata. Compositional Verification of Concurrent Systems Using Petri-Net-Based Condensation Rules. ACM Transactions on Programming Languages and Systems, 20(5):917-979, Sept. 1998.
    • (1998) ACM Transactions on Programming Languages and Systems , vol.20 , Issue.5 , pp. 917-979
    • Juan, E.Y.T.1    Tsai, J.J.P.2    Murata, T.3
  • 17
    • 3042716872 scopus 로고
    • Technical Report ESD-TR-74-193, Information Systems Technology Application Office, Deputy for Command and Management Systems, Electronic Systems Division (AFSC), L. G. Hanscom AFB, MA, USA, June
    • P. A. Karger and R. R. Schell. Multics Security Evaluation: Vulnerability Analysis. Technical Report ESD-TR-74-193, Vol. II, Information Systems Technology Application Office, Deputy for Command and Management Systems, Electronic Systems Division (AFSC), L. G. Hanscom AFB, MA, USA, June 1974.
    • (1974) Multics Security Evaluation: Vulnerability Analysis , vol.2
    • Karger, P.A.1    Schell, R.R.2
  • 19
    • 0022102587 scopus 로고
    • Fault tree analysis, methods, and applications
    • Aug.
    • W. Lee, D. Grosh, and F. Tillman. Fault tree analysis, methods, and applications. IEEE Transactions on Reliability, 34(3): 194-203, Aug. 1985.
    • (1985) IEEE Transactions on Reliability , vol.34 , Issue.3 , pp. 194-203
    • Lee, W.1    Grosh, D.2    Tillman, F.3
  • 20
    • 0016600186 scopus 로고
    • Operating system penetration
    • Proceedings of the AFIPS National Computer Conference, Anaheim, CA, USA, May. AFIPS Press
    • R. R. Linde. Operating System Penetration. In Proceedings of the AFIPS National Computer Conference, volume 44 of AFIPS Conference Proceedings, pages 361-368, Anaheim, CA, USA, May 1975. AFIPS Press.
    • (1975) AFIPS Conference Proceedings , vol.44 , pp. 361-368
    • Linde, R.R.1
  • 24
    • 0004068620 scopus 로고
    • PhD thesis, Technische Hochschule Darmstadt, Darmstadt, Germany. Published in Schriften des Instituts für Instrumentelle Mathematik 3, 1-128, University of Bonn, Germany
    • C. A. Petri. Kommunikation mit Automaten. PhD thesis, Technische Hochschule Darmstadt, Darmstadt, Germany, 1962. Published in Schriften des Instituts für Instrumentelle Mathematik 3, 1-128, University of Bonn, Germany.
    • (1962) Kommunikation Mit Automaten
    • Petri, C.A.1
  • 25
    • 0004006996 scopus 로고
    • Monographs in Theoretical Computer Science. Springer Verlag, Heidelberg, Germany
    • W. Reisig. Petri Nets: An Introduction. Monographs in Theoretical Computer Science. Springer Verlag, Heidelberg, Germany, 1985.
    • (1985) Petri Nets: An Introduction
    • Reisig, W.1
  • 27
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees
    • Dec.
    • B. Schneier. Attack Trees. Dr. Dobb's, 24(12):21-29, Dec. 1999.
    • (1999) Dr. Dobb's , vol.24 , Issue.12 , pp. 21-29
    • Schneier, B.1
  • 28
    • 0031190774 scopus 로고    scopus 로고
    • Stubborn sets for real-time petri nets
    • July
    • R. H. Sloan and U. Buy. Stubborn Sets for Real-Time Petri Nets. Formal Methods in System Design, 11(1):23-40, July 1997.
    • (1997) Formal Methods in System Design , vol.11 , Issue.1 , pp. 23-40
    • Sloan, R.H.1    Buy, U.2
  • 30
    • 14744271048 scopus 로고    scopus 로고
    • Application penetration testing
    • Jan./Feb.
    • H. H. Thompson. Application Penetration Testing. IEEE Security & Privacy, 3(1):66-69, Jan./Feb. 2005.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.1 , pp. 66-69
    • Thompson, H.H.1
  • 31
    • 84960924881 scopus 로고
    • Interval timed coloured petri nets and their analysis
    • M. A. Marsan, editor, Proceedings of Application and Theory of Petri Nets 1993, 14th International Conference, Chicago, IL, USA, June. Springer-Verlag
    • W. M. P. van der Aalst. Interval Timed Coloured Petri Nets and their Analysis. In M. A. Marsan, editor, Proceedings of Application and Theory of Petri Nets 1993, 14th International Conference, volume 691 of Lecture Notes in Computer Science, pages 453-472, Chicago, IL, USA, June 1993. Springer-Verlag.
    • (1993) Lecture Notes in Computer Science , vol.691 , pp. 453-472
    • Van Der Aalst, W.M.P.1
  • 32
    • 0029410947 scopus 로고
    • Analysis of railway stations by means of interval timed coloured petri nets
    • Nov.
    • W. M. P. van der Aalst. Analysis of Railway Stations by Means of Interval Timed Coloured Petri Nets. Real-Time Systems, 9(3):241-263, Nov. 1995.
    • (1995) Real-time Systems , vol.9 , Issue.3 , pp. 241-263
    • Van Der Aalst, W.M.P.1
  • 33
    • 33750949706 scopus 로고    scopus 로고
    • Technical Report Special Publication SP 800-42, U.S. National Institute of Standards and Technology, Gaithersburg, MD, USA, Oct.
    • J. Wack, M. Tracy, and M. Souppaya. Guideline on Network Security Testing. Technical Report Special Publication SP 800-42, U.S. National Institute of Standards and Technology, Gaithersburg, MD, USA, Oct. 2003.
    • (2003) Guideline on Network Security Testing
    • Wack, J.1    Tracy, M.2    Souppaya, M.3
  • 35
    • 33750948520 scopus 로고
    • Technical Report TM-8889/000/00, Paramax Systems Corp., Camarillo, CA, USA, Dec. Prepared under contract to the U.S. Naval Research Laboratory
    • C. Weissman. Security Penetration Testing Guideline, U.S. Navy Handbook on Security Certification. Technical Report TM-8889/000/00, Paramax Systems Corp., Camarillo, CA, USA, Dec. 1992. Prepared under contract to the U.S. Naval Research Laboratory.
    • (1992) Security Penetration Testing Guideline, U.S. Navy Handbook on Security Certification
    • Weissman, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.