ATTACK MODELING OF NETWORK SECURITY BY MEANS OF PETRI NETS
- Authors: Kalinina NA1
-
Affiliations:
- Issue: Vol 10, No 2 (2009)
- Pages: 147-151
- Section: Articles
- URL: https://journals.eco-vector.com/2712-8970/article/view/505024
- ID: 505024
Cite item
Full Text
Abstract
It covers instruction system of network security setting on the basis of attack modeling and network security settings by means of hierarchical Petri Nets. It covers modeling features taking into consideration program vulnerabilities.
Keywords
References
- McDermott, J. P. Attack Net Penetration Testing / J. P. McDermott // Proc. of the 2000 Workshop on New Security Paradigm. New Y ork : ACM Press, 2000. P . 15-21.
- Colore d P e tr i N et B as e d A ttac k Mo de ling / S hij ie Z hou, Zhiguang Qin, Feng Zhang et al. // Rough Sets, Fuzzy Sets, D a ta M ini ng, and G ra nula r C o mpu ting : P ro c . o f the 9t h I nte rn. Conf. Chongqing, China, 2003. P . 715-718.
- Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets / O. M. Dahl, S. D. Wolthusen // Proc. of the 4th IEEE Intern. Inform. W orkshop. Royal Holloway , UK, 2006. P . 157-168.
- Commo n A t tac k P at te rn Enume ratio n and C l as s if ic a tio n [Electr onic r esour ce]. Electr onic data. Access mode: <http://>cape c.mitr e .org/data/dic tionar y .html. Title from display .
- Common Vulnerabilities and Exposures [Electronic re so urce ]. Ele c tro nic data. Ac c e ss mode : <http://C> v e.mitre .org. Title from display .
- National V ulnerability Database [Electronic resource]. Elec tronic data. Ac ce ss mode: <http://Nv> d.nist.gov . Title from display.
- Низамутдинов, М. Ф. Тактика защиты и нападения на web-приложения / М. Ф. Низамутдинов. СПб. : БХВ-Петербург, 2005.