메뉴 건너뛰기




Volumn 10, Issue 1, 2008, Pages 6-19

Taxonomies of attacks and vulnerabilities in computer systems

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY ASSESSMENT;

EID: 68949173234     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/COMST.2008.4483667     Document Type: Review
Times cited : (109)

References (69)
  • 1
    • 2342625318 scopus 로고    scopus 로고
    • More Bang for the Bug: An Account of 2003's Attack Trends
    • Jan.-Feb.
    • I. Arce, "More Bang for the Bug: An Account of 2003's Attack Trends," IEEE Sec. & Privacy, vol. 2, no. 1, Jan.-Feb. 2004, pp. 66-68.
    • (2004) IEEE Sec. & Privacy , vol.2 , Issue.1 , pp. 66-68
    • Arce, I.1
  • 2
    • 0028514027 scopus 로고
    • A Taxonomy of Computer Program Security Flaws
    • Sept.
    • C. E. Landwehr et al., "A Taxonomy of Computer Program Security Flaws," ACM Comp. Surveys, vol. 26, no. 3, Sept. 1994, pp. 211-54.
    • (1994) ACM Comp. Surveys , vol.26 , Issue.3 , pp. 211-254
    • Landwehr, C.E.1
  • 4
    • 2342512768 scopus 로고    scopus 로고
    • Susceptibility Matrix: A New Aid to Software Auditing
    • Mar-Apr
    • K. Jiwnani and M. Zelkowitz, "Susceptibility Matrix: A New Aid to Software Auditing," IEEE Sec. & Privacy, vol. 2, no. 2, Mar-Apr 2004, pp.16-21.
    • (2004) IEEE Sec. & Privacy , vol.2 , Issue.2 , pp. 16-21
    • Jiwnani, K.1    Zelkowitz, M.2
  • 8
    • 11144272176 scopus 로고    scopus 로고
    • A Taxonomy of DDoS Attack and DDoS Defense Mechanisms
    • Apr.
    • J. Mirkovic and P. Reiher, "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms," ACM SIGCOMM Comp. Commun. Rev., vol. 34, no. 2, Apr. 2004, pp. 39-53.
    • (2004) ACM SIGCOMM Comp. Commun. Rev. , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 10
    • 0242456149 scopus 로고    scopus 로고
    • Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool
    • V. Raskin et al., "Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool," Proc. New Sec. Paradigms Wksp., Cloudcroft, NM, 2001, pp. 53-59.
    • Proc. New Sec. Paradigms Wksp., Cloudcroft, NM, 2001 , pp. 53-59
    • Raskin, V.1
  • 11
    • 1942473600 scopus 로고    scopus 로고
    • An Historical Perspective of Software Vulnerability Management
    • Apr.
    • A. Gray, "An Historical Perspective of Software Vulnerability Management," Info. Sec. Tech. Rep., vol. 8, no. 4, Apr. 2003, pp. 34-44.
    • (2003) Info. Sec. Tech. Rep. , vol.8 , Issue.4 , pp. 34-44
    • Gray, A.1
  • 16
    • 0016873760 scopus 로고
    • Penetrating an Operating System: A Study of VM/370 Integrity
    • C. Attanasio, P. Markenstein, and R. J. Phillips, "Penetrating an Operating System: a Study of VM/370 Integrity," IBM Sys. J., vol. 15, no. 1, 1976, pp. 102-16.
    • (1976) IBM Sys. J. , vol.15 , Issue.1 , pp. 102-116
    • Attanasio, C.1    Markenstein, P.2    Phillips, R.J.3
  • 17
    • 0021425586 scopus 로고
    • Can Computer Crime Be Stopped?
    • May
    • T. S. Perry and P. Wallich, "Can Computer Crime Be Stopped?" IEEE Spectrum, vol. 21, no. 5, May 1984, pp. 34-45.
    • (1984) IEEE Spectrum , vol.21 , Issue.5 , pp. 34-45
    • Perry, T.S.1    Wallich, P.2
  • 18
    • 16344386685 scopus 로고
    • What Is There to Worry About? An Introduction to the Computer Security Problem
    • IEEE Comp. Soc. Press
    • D. L. Brinkley and R. R. Schell, "What Is There to Worry About? An Introduction to the Computer Security Problem," Information Security: An Integrated Collection of Essays, pp. 11-39, IEEE Comp. Soc. Press, 1995.
    • (1995) Information Security: An Integrated Collection of Essays , pp. 11-39
    • Brinkley, D.L.1    Schell, R.R.2
  • 19
    • 0030701247 scopus 로고    scopus 로고
    • Information System Attacks: A Preliminary Classification Scheme
    • F. Cohen, "Information System Attacks: A Preliminary Classification Scheme," Comp. & Sec., vol. 16, no. 1, 1997, pp. 29-46.
    • (1997) Comp. & Sec. , vol.16 , Issue.1 , pp. 29-46
    • Cohen, F.1
  • 20
    • 0030674941 scopus 로고    scopus 로고
    • Information System Defenses: A Preliminary Classification Scheme
    • F. Cohen, "Information System Defenses: A Preliminary Classification Scheme," Comp. & Sec., vol. 16, no. 2, 1997, pp. 94-114.
    • (1997) Comp. & Sec. , vol.16 , Issue.2 , pp. 94-114
    • Cohen, F.1
  • 21
    • 0347229432 scopus 로고
    • Tech. rep. SRI Project 2581, Contract DAAB03-73-C-1454, Prepared for USAECOM, Stanford Research Inst., 13 June
    • P. G. Neumann et al., "A Provably Secure Operating System," Tech. rep. SRI Project 2581, Contract DAAB03-73-C-1454, Prepared for USAECOM, Stanford Research Inst., 13 June, 1975.
    • (1975) A Provably Secure Operating System
    • Neumann, P.G.1
  • 22
    • 0018047016 scopus 로고
    • Computer System Security Evaluation
    • June
    • P. G. Neumann, "Computer System Security Evaluation," Proc. Nat'l. Comp. Conf., vol. 47, June 1978, pp. 1087-95.
    • (1978) Proc. Nat'l. Comp. Conf. , vol.47 , pp. 1087-1095
    • Neumann, P.G.1
  • 25
    • 15744370034 scopus 로고    scopus 로고
    • A Taxonomy of Network and Computer Attacks
    • Feb.
    • S. Hansman and R. Hunt, "A Taxonomy of Network and Computer Attacks," Comp. & Sec., vol. 24, no. 1, Feb. 2005, pp. 31-43.
    • (2005) Comp. & Sec. , vol.24 , Issue.1 , pp. 31-43
    • Hansman, S.1    Hunt, R.2
  • 26
    • 0032097883 scopus 로고    scopus 로고
    • A Map of Security Risks Associated with Using COTS
    • June
    • U. Lindquist and E. Jonsson, "A Map of Security Risks Associated with Using COTS," IEEE Computer, vol. 31 no. 6, June 1998, pp. 60-66.
    • (1998) IEEE Computer , vol.31 , Issue.6 , pp. 60-66
    • Lindquist, U.1    Jonsson, E.2
  • 29
    • 0002000920 scopus 로고    scopus 로고
    • Denial of Service Attacks Rip the Internet
    • Apr.
    • Lee Gerber, "Denial of Service Attacks Rip the Internet," IEEE Computer, vol. 33, no. 4, Apr. 2000, pp. 12-17.
    • (2000) IEEE Computer , vol.33 , Issue.4 , pp. 12-17
    • Gerber, L.1
  • 30
    • 84966591863 scopus 로고    scopus 로고
    • Denial-of-Service Attacks
    • Apr.
    • P. G. Neumann, "Denial-of-Service Attacks," ACM Commun., vol 43. no. 4, Apr. 2000, pp. 136.
    • (2000) ACM Commun. , vol.43 , Issue.4 , pp. 136
    • Neumann, P.G.1
  • 31
    • 33746715594 scopus 로고    scopus 로고
    • PING Attack - How Bad Is It?
    • July
    • S. Kumar, "PING Attack - How Bad Is It?" Comp. & Sec. J., vol. 25, issue 5, July 2006, pp. 332-37.
    • (2006) Comp. & Sec. J. , vol.25 , Issue.5 , pp. 332-337
    • Kumar, S.1
  • 32
    • 26844496827 scopus 로고    scopus 로고
    • On Impact of Distributed Denial of Service (DDoS) Attack due to ARP Storm
    • Springer-Verlag, Apr.
    • S. Kumar, "On Impact of Distributed Denial of Service (DDoS) Attack due to ARP Storm," Lecture Notes in Comp. Sci., vol. LNCS-3421, Springer-Verlag, Apr. 2005.
    • (2005) Lecture Notes in Comp. Sci. , vol.LNCS-3421
    • Kumar, S.1
  • 34
    • 0038443107 scopus 로고    scopus 로고
    • A Taxonomy of Web Attacks Suitable for Efficient Encoding
    • G. Alvarez and S. Petrovic, "A Taxonomy of Web Attacks Suitable for Efficient Encoding," Comp. & Sec., vol. 22, no. 5, 2003, pp. 435-49.
    • (2003) Comp. & Sec. , vol.22 , Issue.5 , pp. 435-449
    • Alvarez, G.1    Petrovic, S.2
  • 35
    • 30344461584 scopus 로고    scopus 로고
    • The Denial-of-Service Dance
    • Nov.-Dec.
    • P. L. Campbell, "The Denial-of-Service Dance," IEEE Sec. & Privacy, vol. 3, no. 6, Nov.-Dec. 2005, pp. 34-40.
    • (2005) IEEE Sec. & Privacy , vol.3 , Issue.6 , pp. 34-40
    • Campbell, P.L.1
  • 36
    • 30344447665 scopus 로고    scopus 로고
    • A Framework for Countering Denial-of-Information Attacks
    • Nov.-Dec.
    • G. Conti and M. Ahamad, "A Framework for Countering Denial-of-Information Attacks," IEEE Sec. & Privacy, vol. 3, no. 6, Nov.-Dec. 2005, pp. 50-56.
    • (2005) IEEE Sec. & Privacy , vol.3 , Issue.6 , pp. 50-56
    • Conti, G.1    Ahamad, M.2
  • 37
    • 0002885224 scopus 로고    scopus 로고
    • Prudent Engineering Practice for Cryptographic Protocols
    • Jan
    • M. Abadi and R. Needham, "Prudent Engineering Practice for Cryptographic Protocols," IEEE Trans. Software Eng., vol. 22, no. 1, Jan 1996, pp. 6-15.
    • (1996) IEEE Trans. Software Eng. , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 38
    • 0036793924 scopus 로고    scopus 로고
    • Denial of Service in Sensor Networks
    • Oct.
    • A. Wood and J. A. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer, vol. 35, no. 10, Oct. 2002, pp. 54-62.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.1    Stankovic, J.A.2
  • 40
    • 12844286929 scopus 로고    scopus 로고
    • The Shellcode Generation
    • Sept.-Oct.
    • I. Arce, "The Shellcode Generation," IEEE Sec. & Privacy, vol. 2, no. 5, Sept.-Oct. 2004, pp.72-76.
    • (2004) IEEE Sec. & Privacy , vol.2 , Issue.5 , pp. 72-76
    • Arce, I.1
  • 42
    • 3142684130 scopus 로고    scopus 로고
    • A Taxonomy for Attacks on Mobile Agent
    • 4-7 July
    • M. C. Man and V. K. Wei, "A Taxonomy for Attacks on Mobile Agent," EUROCON 2001, vol. 2, 4-7 July 2001, pp. 385-88.
    • (2001) EUROCON 2001 , vol.2 , pp. 385-388
    • Man, M.C.1    Wei, V.K.2
  • 46
    • 0016336411 scopus 로고
    • Operating System Integrity in OS/VS2
    • W. S. McPhee, "Operating System Integrity in OS/VS2," IBM Sys. J., vol. 13, no. 3, 1974, pp. 230-52.
    • (1974) IBM Sys. J. , vol.13 , Issue.3 , pp. 230-252
    • McPhee, W.S.1
  • 47
    • 0003513832 scopus 로고
    • Tech. rep. NBSIR 76-1041, Lawrence Livermore Lab., Inst. for Comp. Sci. and Tech./Nat'l. Bureau of Standards, RISOS Project, Washington, DC, Apr.
    • R. P. Abbott et al., "Security Analysis and Enhancements of Computer Operating Systems," Tech. rep. NBSIR 76-1041, Lawrence Livermore Lab., Inst. for Comp. Sci. and Tech./Nat'l. Bureau of Standards, RISOS Project, Washington, DC, Apr. 1976.
    • (1976) Security Analysis and Enhancements of Computer Operating Systems
    • Abbott, R.P.1
  • 50
    • 0004229237 scopus 로고    scopus 로고
    • Ph.D. dissertation, Purdue Univ., Coast TR 98-09
    • I. Krsul, "Software Vulnerability Analysis," Ph.D. dissertation, Purdue Univ., Coast TR 98-09, 1998.
    • (1998) Software Vulnerability Analysis
    • Krsul, I.1
  • 52
    • 0037903656 scopus 로고    scopus 로고
    • Analysis of Vulnerabilities in Internet Firewalls
    • S. Kamara et al., "Analysis of Vulnerabilities in Internet Firewalls," Comp. & Sec., vol. 22, no. 3, 2003, pp. 214-32.
    • (2003) Comp. & Sec. , vol.22 , Issue.3 , pp. 214-232
    • Kamara, S.1
  • 53
    • 1942521938 scopus 로고    scopus 로고
    • Taxonomy of Security Considerations and Software Quality
    • June
    • H. Wang and C. Wang, "Taxonomy of Security Considerations and Software Quality," Commun. ACM, vol. 46, no. 6, June 2003, pp. 75-78.
    • (2003) Commun. ACM , vol.46 , Issue.6 , pp. 75-78
    • Wang, H.1    Wang, C.2
  • 54
    • 30344442772 scopus 로고    scopus 로고
    • Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors
    • Nov.-Dec.
    • K. Tsipenyuk, B. Chess, andG. McGraw, "Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors," IEEE Sec. & Privacy, vol. 3, no. 6, Nov.-Dec. 2005, pp. 81-84.
    • (2005) IEEE Sec. & Privacy , vol.3 , Issue.6 , pp. 81-84
    • Tsipenyuk, K.1    Chess, B.2    McGraw, G.3
  • 58
    • 3142654848 scopus 로고
    • Reprinted in Jan.
    • Reprinted in ACM Op. Sys. Rev. 8, no. 1, Jan. 1974, pp 18-24.
    • (1974) ACM Op. Sys. Rev. , vol.8 , Issue.1 , pp. 18-24
  • 60
    • 31344451091 scopus 로고    scopus 로고
    • Security Vulnerabilities: From Analysis to Detection and Masking Techniques
    • Feb.
    • S. Chen et al., "Security Vulnerabilities: From Analysis to Detection and Masking Techniques," Proc. IEEE, vol. 94, no. 2, Feb. 2006, pp. 407-18.
    • (2006) Proc. IEEE , vol.94 , Issue.2 , pp. 407-418
    • Chen, S.1
  • 62
    • 0011192575 scopus 로고    scopus 로고
    • CERT(r) Advisory CA-1997-28
    • IP Denial-of-Service Attacks, CERT(r) Advisory CA-1997-28, http://www.cert.org/advisories/CA-1997-28.html
    • IP Denial-of-Service Attacks
  • 63
    • 0024122244 scopus 로고
    • Methodology for Network Communication Vulnerability Analysis
    • 23-26 Oct.
    • M. P. Ristenbatt, "Methodology for Network Communication Vulnerability Analysis," MILCOM 1988, vol. 2, 23-26 Oct., pp. 493-99.
    • (1988) MILCOM , vol.2 , pp. 493-499
    • Ristenbatt, M.P.1
  • 66
    • 0002738343 scopus 로고
    • Security Problems in the TCP/IP Protocol Suite
    • Apr.
    • S. M. Bellovin, "Security Problems in the TCP/IP Protocol Suite," Comp. Commun. Rev., vol. 2, no. 19, Apr. 1989, pp. 32-48.
    • (1989) Comp. Commun. Rev. , vol.2 , Issue.19 , pp. 32-48
    • Bellovin, S.M.1
  • 69
    • 33646930309 scopus 로고    scopus 로고
    • Vulnerability Analysis and Best Practices for Adopting IP Telephony in Critical Infrastructure Sectors
    • Apr.
    • F. Cao and S. Malik, "Vulnerability Analysis and Best Practices for Adopting IP Telephony in Critical Infrastructure Sectors," IEEE Commun. Mag., vol. 44, no. 4, Apr. 2006, pp. 138-45.
    • (2006) IEEE Commun. Mag. , vol.44 , Issue.4 , pp. 138-145
    • Cao, F.1    Malik, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.