CFP last date
20 May 2024
Reseach Article

ADMIT- A Five Dimensional Approach towards Standardization of Network and Computer Attack Taxonomies

by Chanchala Joshi, Umesh Kumar Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 100 - Number 5
Year of Publication: 2014
Authors: Chanchala Joshi, Umesh Kumar Singh
10.5120/17524-8091

Chanchala Joshi, Umesh Kumar Singh . ADMIT- A Five Dimensional Approach towards Standardization of Network and Computer Attack Taxonomies. International Journal of Computer Applications. 100, 5 ( August 2014), 30-36. DOI=10.5120/17524-8091

@article{ 10.5120/17524-8091,
author = { Chanchala Joshi, Umesh Kumar Singh },
title = { ADMIT- A Five Dimensional Approach towards Standardization of Network and Computer Attack Taxonomies },
journal = { International Journal of Computer Applications },
issue_date = { August 2014 },
volume = { 100 },
number = { 5 },
month = { August },
year = { 2014 },
issn = { 0975-8887 },
pages = { 30-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume100/number5/17524-8091/ },
doi = { 10.5120/17524-8091 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:29:12.631930+05:30
%A Chanchala Joshi
%A Umesh Kumar Singh
%T ADMIT- A Five Dimensional Approach towards Standardization of Network and Computer Attack Taxonomies
%J International Journal of Computer Applications
%@ 0975-8887
%V 100
%N 5
%P 30-36
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper proposed a five dimensional taxonomy ADMIT which captures five major classifiers to characterize the nature of attacks. These are classification by attack vector, classification by defense, classification by method, classification by impact and classification by attack target. The classification structure of proposed taxonomy described the nature of attacks thoroughly. The administrator can use the proposed taxonomy to locate strategies that are appropriate for securing their system against vulnerabilities that can be exploited. Use of ADMIT taxonomy in network defense strategies can improve the overall level of security.

References
  1. Hansman, S. , Hunt R. , "A taxonomy of network and computer attacks". Computer and Security, vol. 24, issue 1, Feb 2005, PP. 31-43.
  2. Simmons, C. , Ellis, C. , Shiva, S. , Dasgupta, D. , & Wu, Q. "AVOIDIT: A Cyber Attack Taxonomy", University of Memphis, Technical Report CS-09-003, 2009. [Online]. Available: http://issrl. cs. memphis. edu/?les/papers/CyberAttackTaxonomy IEEE Mag. pdf
  3. R. P. Abbott et al, "Security Analysis and Enhancements of Computer Operating Systems," Report NBSIR 76-1041, Institute for Computer Science and Technology, Natl. Bur. of Stnds, Apr. 1976.
  4. Bisbey, R. and D. Hollingsworth, "Protection Analysis Project Final Report, "Information Sciences Institute, University of Southern California, Marina Del Rey, CA, 1978.
  5. T. Aslam, "A taxonomy of Security Faults in the Unix Operating System," M. S. Thesis, Purdue University, 1995.
  6. T. Aslam, "Use of a taxonomy of Security Faults," Technical Report 96-05, COAST Laboratory, Department of Computer Science, Purdue University, March 1996.
  7. I. Krsul, "Software Vulnerability Analysis," Ph. D. dissertation, Purdue Univ. , 1998.
  8. M. Bishop, "A Taxonomy of UNIX System and Network Vulnerabilities," Technical Report CSE-95-10, Purdue University, May 1995.
  9. Howard, John D. and Longstaff, Thomas A. "A Common Language for Computer Security Incidents," Technical report, Sandia National Laboratories, Oct. 1998.
  10. Kjaerland, M. , "A taxonomy and comparison of computer security incidents from the commercial and government sectors". Computers and Security, Volume 25, Issue 7, October 2006, PP 522–538.
  11. Lough, Daniel. "A Taxonomy of Computer Attacks with Applications to Wireless Networks," PhD thesis, Virginia Polytechnic Institute and State University, 2001.
  12. Scott D. , Angelos S," Towards a Cyber Conflict Taxonomy", 5th International Conference on Cyber Conflict K. Podins, J. Stinissen, M. Maybaum (Eds. ), 2013.
  13. E. G. Amoroso, "Fundamentals of Computer Security Technology", Upper Saddle River, NJ: Prentice-HallPTR, 1994.
  14. Anthony D. Wood, John A. Stankovic, "A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks," Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, CRC Press, 2004.
  15. C. Douligeris and A. Mitrokotsa, "DDoS Attacks and Defense Mechanisms: Classification and State-of-theart," Comp. Networks, Volume 44, Issue 5, April 2004, PP 643–666
  16. David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford and Nicholas Weaver. "Inside the slammer worm", IEEE Security and Privacy, volume 1, 2003, PP 33-39.
  17. William A. Arbaugh, William L. Fithen, and John McHugh, "Windows of Vulnerability: A Case Study Analysis", IEEE Computer, 33, issue 12, Dec. 2000, PP 52-59.
  18. CERT Coordination Center, "CERT Advisory CA-2003-20 W32/Blaster worm," Aug. 2003; www. cert. org/advisories/CA-2003-20. html.
Index Terms

Computer Science
Information Sciences

Keywords

Network security Vulnerability Attack taxonomy