Corpus ID: 14326913

2 . 3 Van Heerden ’ s network attack taxonomy

@inproceedings{Abrek201523,
  title={2 . 3 Van Heerden ’ s network attack taxonomy},
  author={Natascha Abrek and Nadine Herold},
  year={2015}
}
In the past few years network security threats have increased significantly. Methods for attacks have not only grown in diversity but also became more sophisticated. The increased need for security mechanisms and countermeasures requires a comprehensive understanding of those attacks and their characteristics. To organize the knowledge of attacks a large variety of classifications were proposed in form of taxonomies and ontologies. The development of these classifications has emerged as an… CONTINUE READING

Figures and Tables from this paper

References

SHOWING 1-10 OF 28 REFERENCES
Ontology-based model of network and computer attacks for security assessment
  • 24
  • Highly Influential
Taxonomies of attacks and vulnerabilities in computer systems
  • 140
  • Highly Influential
AVOIDIT: A Cyber Attack Taxonomy
  • 121
  • PDF
Modeling Computer Attacks: An Ontology for Intrusion Detection
  • 182
  • PDF
How to systematically classify computer security intrusions
  • 190
From Security Modelling to Run-time Security Monitoring
  • 19
Attack Surfaces: A Taxonomy for Attacks on Cloud Services
  • 200
  • PDF
Ontologies for Security Requirements: A Literature Survey and Classification
  • 84
  • PDF
A Systematic Review and Comparison of Security Ontologies
  • 115
  • PDF