View/ Open
hamad_ICI.pdf (568.9Kb)
Download
Publication date
2016Author
Al-Mohannadi, HamadMirza, Qublai K.A.
Namanya, Anitta P.
Awan, Irfan U.
Cullen, Andrea J.
Pagna Disso, Jules F.
Rights
© 2016 IEEE. Full-text reproduced in accordance with the publisher’s self-archiving policy. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Peer-Reviewed
Yes
Metadata
Show full item recordAbstract
Cyber attack is a sensitive issue in the world of Internet security. Governments and business organisations around the world are providing enormous effort to secure their data. They are using various types of tools and techniques to keep the business running, while adversaries are trying to breach security and send malicious software such as botnets, viruses, trojans etc., to access valuable data. Everyday the situation is getting worse because of new types of malware emerging to attack networks. It is important to understand those attacks both before and after they happen in order to provide better security to our systems. Understanding attack models provide more insight into network vulnerability; which in turn can be used to protect the network from future attacks. In the cyber security world, it is difficult to predict a potential attack without understanding the vulnerability of the network. So, it is important to analyse the network to identify top possible vulnerability list, which will give an intuitive idea to protect the network. Also, handling an ongoing attack poses significant risk on the network and valuable data, where prompt action is necessary. Proper utilisation of attack modelling techniques provide advance planning, which can be implemented rapidly during an ongoing attack event. This paper aims to analyse various types of existing attack modelling techniques to understand the vulnerability of the network; and the behaviour and goals of the adversary. The ultimate goal is to handle cyber attack in efficient manner using attack modelling techniques.Version
Accepted manuscriptCitation
Al-Mohannadi H, Mirza Q, Namanya A et al (2016) Cyber-Attack Modeling Analysis Techniques: An Overview. In: Proceedings of the 4th International Conference on Future Internet of Things and Cloud Workshops. 22-24 Aug 2016, Vienna, Austria.Link to Version of Record
https://doi.org/10.1109/w-ficloud.2016.29Type
Conference paperae974a485f413a2113503eed53cd6c53
https://doi.org/10.1109/w-ficloud.2016.29