Corpus ID: 113314686

An Approach to Counteracting the Common Cyber-attacks According to the Metric-Based Model

@inproceedings{Geramiparvar2015AnAT,
  title={An Approach to Counteracting the Common Cyber-attacks According to the Metric-Based Model},
  author={Mohammad Sirwan Geramiparvar and Nasser Modiri},
  year={2015}
}
Nowadays the words such as cyber and electronic attacks are heard of more than any other ones. They refer to the attacks which can ruin the structure and foundation of a company, organization, or even a ministry and cause irreparable damages. Analyzing these intrusions, we ascertain that every cyber-attack benefits from four general weaknesses: innate and structural weakness, configurations, design and implementation, and human-made errors. Concentrating on the relevant weaknesses and… Expand
1 Citations

Figures and Tables from this paper

Ontology Generation of Advanced Persistent Threats and their Automated Analysis
  • 3

References

SHOWING 1-7 OF 7 REFERENCES
Execution Patterns in Automatic Malware and Human-Centric Attacks
  • 12
Defining categories to select representative attack test-cases
  • 21
  • PDF
A common language for computer security incidents
  • 407
  • PDF
Presenting a Metric-Based Model for Malware Detection and Classification
  • International Journal Of Computer & Information Technology (IJOCIT)
  • 2014
No.2 http://www.ijcsns.com ISSN 2345-3397 International journal of Computer Science & Network Solutions Feb.2015-Volume 3
  • No.2 http://www.ijcsns.com ISSN 2345-3397 International journal of Computer Science & Network Solutions Feb.2015-Volume 3
References i
  • References i