How to Systematically Classify Computer Security Intrusions

@inproceedings{Lindqvist1997HowTS,
  title={How to Systematically Classify Computer Security Intrusions},
  author={Ulf Lindqvist and Erland Jonsson},
  booktitle={IEEE Symposium on Security and Privacy},
  year={1997}
}
This paper presents a class@cation of intrusions with respect to technique as well as to result. The taxonomy is intended to be a step on the road to an established taxonomy of intrusions for use in incident reporting, statistics, warning bulletins, intrusion detection systems etc. Unlike previous schemes, it takes the viewpoint of the system owner and should therefore be suitable to a wider community than that of system developers and vendors only. It is based on data from a tzalistic… CONTINUE READING
Highly Influential
This paper has highly influenced 19 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 273 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.
178 Citations
11 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 178 extracted citations

273 Citations

0102030'98'02'07'12'17
Citations per Year
Semantic Scholar estimates that this publication has 273 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 11 references

A taxonomy of security faults in the Unix operating system

  • T. Aslam
  • Master’s thesis,
  • 1995

A practical perspective on routers

  • S. 0. Bradner
  • Internet System Handbook,
  • 1993

A summary of computer misuse techniques

  • P. G. Neumann, D. B. Parker
  • In Proceedings of the 12th National Computer…
  • 1989

On the security of UNIX

  • D. M. Ritchie
  • Reprinted in UNIX System Manager’s Manual,
  • 1975

Similar Papers

Loading similar papers…