CFP last date
22 April 2024
Reseach Article

A Framework for the Simulation of Attack using Model Checking

by Ebot Ebot Enaw, Djoursoubo Pagou Prosper
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 29
Year of Publication: 2018
Authors: Ebot Ebot Enaw, Djoursoubo Pagou Prosper
10.5120/ijca2018918168

Ebot Ebot Enaw, Djoursoubo Pagou Prosper . A Framework for the Simulation of Attack using Model Checking. International Journal of Computer Applications. 182, 29 ( Nov 2018), 39-45. DOI=10.5120/ijca2018918168

@article{ 10.5120/ijca2018918168,
author = { Ebot Ebot Enaw, Djoursoubo Pagou Prosper },
title = { A Framework for the Simulation of Attack using Model Checking },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2018 },
volume = { 182 },
number = { 29 },
month = { Nov },
year = { 2018 },
issn = { 0975-8887 },
pages = { 39-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number29/30168-2018918168/ },
doi = { 10.5120/ijca2018918168 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:12:52.375678+05:30
%A Ebot Ebot Enaw
%A Djoursoubo Pagou Prosper
%T A Framework for the Simulation of Attack using Model Checking
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 29
%P 39-45
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Over the past couple of years, the number of cyber-attacks and data breaches have considerably increased and so have the damages they cause, making cyber risk one of the primary concerns for top managers and world leaders around the world. Public and private organizations are therefore obliged to deploy appropriate security solutions in a bid to protect their assets against threats over time. However the complexity of information systems coupled with the interconnected nature of assets complicate efforts to identify the loopholes in an information system especially given the dynamism of cybersecurity where new vulnerabilities are discovered around the world daily. In an effort to provide IT administrators with a rapid and reliable way of detecting loopholes, the paper proposes a framework that leverages formal verification concepts to provide an abstract model of an information system with specific properties aimed at verifying the security of assets. The paper is structured as follows: section 1 introduces the article, section 2 presents some research papers related to this paper’s topic, section 3 states the problem, section 4 presents the paper’s contribution to research, and section 5 presents the proposed framework

References
  1. Patrice Godefroid, Koushik Sen. 2018. Combining model checking and testing in Handbook of model checking pp 613-649
  2. Ebot Enaw, Djoursoubo Pagou. 2018. A Conceptual Framework for the Design of a Nationwide Cyber-Risk Monitoring System in International Journal of Computer Applications volume 181 number 17.
  3. Adam Michael Houser. 2018. Mental Models for Cybersecurity: A Formal Methods Approach in A dissertation submitted to the Faculty of the Graduate School of the University at Buffalo, State University of New York
  4. Dirk Beyer, Sumit Gulwani, David A. Schmidt, 2018. Combining Model Checking and Data-Flow Analysis in Handbook of Model Checking
  5. Alessandro Cimatti, Ivan Stojic, Stefano Tonetta. 2018. Formal Specification and Verification of Dynamic Parametrized Architectures in International Symposium on Formal Methods pp 625-644
  6. Hamed Nemati, Christoph Baumann, Roberto Guanciale, Mads Dam. 2018. Formal Verification of Integrity-Preserving Countermeasures Against Cache Storage Side-Channels in International Conference on Principles of Security and Trust pp 109-133
  7. Jeffrey Voas, Kim Schaffer. 2016. Insights on Formal Methods in Cybersecurity in IEE computer society, issue N°5 pp 102-105
  8. Md Tawhid, Bin Waez∗, Juergen Dingel, Karen Rudie. 2013. A survey of timed automata for the development of real-time systems in Computer science review
Index Terms

Computer Science
Information Sciences

Keywords

Risk vulnerability attack surface.