Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Taxonomies of attacks and vulnerabilities in computer systems

Published: 01 January 2008 Publication History

Abstract

Security assessment of a system is a difficult problem. Most of the current efforts in security assessment involve searching for known vulnerabilities. Finding unknown vulnerabilities still largely remains a subjective process. The process can be improved by understanding the characteristics and nature of known vulnerabilities. The knowledge thus gained can be organized into a suitable taxonomy, which can then be used as a framework for systematically examining new systems for similar but as yet unknown vulnerabilities. There have been many attempts at producing such taxonomies. This article provides a comprehensive survey of the important work done on developing taxonomies of attacks and vulnerabilities in computer systems. This survey covers work done in security related taxonomies from 1974 until 2006. Apart from providing a state-of-the-art survey of taxonomies, we also analyze their effectiveness for use in a security assessment process. Finally, we summarize the important properties of various taxonomies to provide a framework for organizing information about known attacks and vulnerabilities into a taxonomy that would benefit the security assessment process.

Cited By

View all
  • (2023)Towards an Improved Taxonomy of Attacks Related to Digital Identities and Identity Management SystemsSecurity and Communication Networks10.1155/2023/55733102023Online publication date: 19-Jun-2023
  • (2022)TaxIdMA: Towards a Taxonomy for Attacks related to IdentitiesProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544430(1-13)Online publication date: 23-Aug-2022
  • (2022)Design and Implementation of a Quantitative Network Health Monitoring and Recovery SystemWireless Personal Communications: An International Journal10.1007/s11277-022-09554-9125:1(367-397)Online publication date: 1-Jul-2022
  • Show More Cited By

Index Terms

  1. Taxonomies of attacks and vulnerabilities in computer systems
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image IEEE Communications Surveys & Tutorials
      IEEE Communications Surveys & Tutorials  Volume 10, Issue 1
      January 2008
      84 pages

      Publisher

      IEEE Press

      Publication History

      Published: 01 January 2008

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 04 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Towards an Improved Taxonomy of Attacks Related to Digital Identities and Identity Management SystemsSecurity and Communication Networks10.1155/2023/55733102023Online publication date: 19-Jun-2023
      • (2022)TaxIdMA: Towards a Taxonomy for Attacks related to IdentitiesProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544430(1-13)Online publication date: 23-Aug-2022
      • (2022)Design and Implementation of a Quantitative Network Health Monitoring and Recovery SystemWireless Personal Communications: An International Journal10.1007/s11277-022-09554-9125:1(367-397)Online publication date: 1-Jul-2022
      • (2021)Analysis of Challenges in Modern Network Forensic FrameworkSecurity and Communication Networks10.1155/2021/88712302021Online publication date: 1-Jan-2021
      • (2021)Insiders Dissected: New Foundations and a Systematisation of the Research on InsidersDigital Threats: Research and Practice10.1145/34736743:1(1-35)Online publication date: 22-Oct-2021
      • (2020)AVARCIBER: a framework for assessing cybersecurity risksCluster Computing10.1007/s10586-019-03034-923:3(1827-1843)Online publication date: 1-Sep-2020
      • (2020)Hacking Goals: A Goal-Centric Attack Classification FrameworkTesting Software and Systems10.1007/978-3-030-64881-7_19(296-301)Online publication date: 9-Dec-2020
      • (2019)Requirements for preventing logic flaws in the authentication procedure of web applicationsProceedings of the 34th ACM/SIGAPP Symposium on Applied Computing10.1145/3297280.3297438(1620-1628)Online publication date: 8-Apr-2019
      • (2018)A Survey of Random Forest Based Methods for Intrusion Detection SystemsACM Computing Surveys10.1145/317858251:3(1-36)Online publication date: 23-May-2018
      • (2017)TTPDrillProceedings of the 33rd Annual Computer Security Applications Conference10.1145/3134600.3134646(103-115)Online publication date: 4-Dec-2017
      • Show More Cited By

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media