[PDF][PDF] AVOIDIT: A cyber attack taxonomy

C Simmons, C Ellis, S Shiva… - University of Memphis …, 2009 - researchgate.net
Cyber attacks have greatly increased over the years, where the attackers have progressively
improved in devising attacks towards a specific target. To aid in identifying and defending …

A taxonomy of network and computer attacks

S Hansman, R Hunt - Computers & Security, 2005 - Elsevier
Attacks over the years have become both increasingly numerous and sophisticated. This
paper focuses on the provisioning of a method for the analysis and categorisation of both …

A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions

H Ahmetoglu, R Das - Internet of Things, 2022 - Elsevier
Rapid developments in network technologies and the amount and scope of data transferred
on networks are increasing day by day. Depending on this situation, the density and …

Cyber-attack scoring model based on the offensive cybersecurity framework

K Kim, FA Alfouzan, H Kim - Applied Sciences, 2021 - mdpi.com
Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-
attacks is gradually changing. Early cyber-attacks were usually conducted by curious …

A defense-centric taxonomy based on attack manifestations

KS Killourhy, RA Maxion… - … on Dependable Systems …, 2004 - ieeexplore.ieee.org
Many classifications of attacks have been tendered, often in taxonomic form, A common
basis of these taxonomies is that they have been framed from the perspective of an attacker …

Network attacks: Taxonomy, tools and systems

N Hoque, MH Bhuyan, RC Baishya… - Journal of Network and …, 2014 - Elsevier
To prevent and defend networks from the occurrence of attacks, it is highly essential that we
have a broad knowledge of existing tools and systems available in the public domain. Based …

[PDF][PDF] A survey of cyber attack detection systems

S Singh, S Silakari - International Journal of Computer Science and …, 2009 - academia.edu
In the recent years, number of attacks on networks has exponentially increased therefore;
interest in cyber attack detection has increased among the researchers. The tremendous …

Identification of attack paths using kill chain and attack graphs

L Sadlek, P Čeleda, D Tovarňák - NOMS 2022-2022 IEEE/IFIP …, 2022 - ieeexplore.ieee.org
The ever-evolving capabilities of cyber attackers force security administrators to focus on the
early identification of emerging threats. Targeted cyber attacks usually consist of several …

HARMer: Cyber-attacks automation and evaluation

SY Enoch, Z Huang, CY Moon, D Lee, MK Ahn… - IEEE …, 2020 - ieeexplore.ieee.org
With the increasing growth of cyber-attack incidences, it is important to develop innovative
and effective techniques to assess and defend networked systems against cyber attacks …

Computer attack trends challenge Internet security

A Householder, K Houle, C Dougherty - Computer, 2002 - ieeexplore.ieee.org
Organizations relying on the Internet face significant challenges to ensure that their networks
operate safely and that their systems continue to provide critical services even in the face of …