ADMIT- A Five Dimensional Approach towards Standardization of Network and Computer Attack Taxonomies

This paper proposed a five dimensional taxonomy ADMIT which captures five major classifiers to characterize the nature of attacks. These are classification by attack vector, classification by defense, classification by method, classification by impact and classification by attack target. The classification structure of proposed taxonomy described the nature of attacks thoroughly. The administrator can use the proposed taxonomy to locate strategies that are appropriate for securing their system against vulnerabilities that can be exploited. Use of ADMIT taxonomy in network defense strategies can improve the overall level of security.

[1]  Qishi Wu,et al.  AVOIDIT: A Cyber Attack Taxonomy , 2009 .

[2]  Eugene H. Spafford,et al.  Software vulnerability analysis , 1998 .

[3]  Eugene H. Spafford,et al.  Use of A Taxonomy of Security Faults , 1996 .

[4]  Edward G. Amoroso,et al.  Fundamentals of computer security technology , 1994 .

[5]  Aikaterini Mitrokotsa,et al.  DDoS attacks and defense mechanisms: classification and state-of-the-art , 2004, Comput. Networks.

[6]  Thomas A. Longstaff,et al.  A common language for computer security incidents , 1998 .

[7]  R. P. Abbott,et al.  Security Analysis and Enhancements of Computer Operating Systems , 1976 .

[8]  Ray Hunt,et al.  A taxonomy of network and computer attacks , 2005, Comput. Secur..

[9]  李幼升,et al.  Ph , 1989 .

[10]  Angelos Stavrou,et al.  Towards a Cyber Conflict Taxonomy , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[11]  Maria Kjaerland,et al.  A taxonomy and comparison of computer security incidents from the commercial and government sectors , 2006, Comput. Secur..

[12]  John A. Stankovic,et al.  A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks , 2004, Handbook of Sensor Networks.

[13]  William A. Arbaugh,et al.  IEEE 52 Computer , 1985 .

[14]  Stefan Savage,et al.  Inside the Slammer Worm , 2003, IEEE Secur. Priv..

[15]  Matt Bishop,et al.  A Taxonomy of UNIX System and Network Vulnerabilities , 1997 .

[16]  D. L. Lough,et al.  A taxonomy of computer attacks with applications to wireless networks , 2001 .