Modeling Attacks
Price
Free (open access)
Volume
Volume 4 (2014), Issue 2
Pages
18
Page Range
97 - 115
Paper DOI
10.2495/SAFE-V4-N2-97-115
Copyright
WIT Press
Author(s)
S. AL-FEDAGHI & SAMER MOEIN
Abstract
The aim of this paper is to develop a general conceptual model of attack progression that can be applied to modeling of computer and communication threat risks. This paper focuses on attacks that aim at overpowering the victim/prey to gain some benefit. It examines existing models and introduces a new flow model to facilitate development of a general model of two-sided combat. The symmetry between the attacker’s and defender’s flow systems of signals, information, plans, decisions, and actions results in a single combat model incorporating the realms of both attacker and defender. Based on this conceptualization, it is possible to characterize the weak points and develop a map of vulnerabilities in the defender’s system. Such a methodology of attack modeling provides a base for analysis in the fields of threat modeling and secure software development. Finally, this new model is applied to an SQL injection problem in web services to demonstrate implementation of a real system problem.
Keywords
Attacks, conceptual model, security, SQL injection, threat risk