We first consider network security services and then review threats, vulnerabilities and failure modes. This review is based on standard texts, using well-known concepts, categorizations, and methods, e.g. risk analysis using asset-based threat profiles and vulnerability profiles (attributes). The review is used to construct a framework which is then used to define an extensible ontology for network security attacks. We present a conceptualization of this ontology in figure 1. Keywords: network, cyber, security, ontology, attack, threat, vulnerability, failure. © Springer-Verlag 2004.
CITATION STYLE
Simmonds, A., Sandilands, P., & Van Ekert, L. (2004). An ontology for network security attacks. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3285, 317–323. https://doi.org/10.1007/978-3-540-30176-9_41
Mendeley helps you to discover research relevant for your work.