ATTACK MODELING OF NETWORK SECURITY BY MEANS OF PETRI NETS


Cite item

Full Text

Abstract

It covers instruction system of network security setting on the basis of attack modeling and network security settings by means of hierarchical Petri Nets. It covers modeling features taking into consideration program vulnerabilities.

About the authors

N A Kalinina

Email: kna@akadem.ru

References

  1. McDermott, J. P. Attack Net Penetration Testing / J. P. McDermott // Proc. of the 2000 Workshop on New Security Paradigm. New Y ork : ACM Press, 2000. P . 15-21.
  2. Colore d P e tr i N et B as e d A ttac k Mo de ling / S hij ie Z hou, Zhiguang Qin, Feng Zhang et al. // Rough Sets, Fuzzy Sets, D a ta M ini ng, and G ra nula r C o mpu ting : P ro c . o f the 9t h I nte rn. Conf. Chongqing, China, 2003. P . 715-718.
  3. Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets / O. M. Dahl, S. D. Wolthusen // Proc. of the 4th IEEE Intern. Inform. W orkshop. Royal Holloway , UK, 2006. P . 157-168.
  4. Commo n A t tac k P at te rn Enume ratio n and C l as s if ic a tio n [Electr onic r esour ce]. Electr onic data. Access mode: <http://>cape c.mitr e .org/data/dic tionar y .html. Title from display .
  5. Common Vulnerabilities and Exposures [Electronic re so urce ]. Ele c tro nic data. Ac c e ss mode : <http://C> v e.mitre .org. Title from display .
  6. National V ulnerability Database [Electronic resource]. Elec tronic data. Ac ce ss mode: <http://Nv> d.nist.gov . Title from display.
  7. Низамутдинов, М. Ф. Тактика защиты и нападения на web-приложения / М. Ф. Низамутдинов. СПб. : БХВ-Петербург, 2005.

Supplementary files

Supplementary Files
Action
1. JATS XML

Copyright (c) 2009 Kalinina N.A.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies