A Taxonomy of Network and Computer Attack Methodologies

Since the invention of computers and networks, people have found various ways to attack them. Attacks over the years have ranged from using a sledge hammer on a computer, to advanced distributed denial of service attacks. This research focuses on computer and network attacks and providing a taxonomy of them. This is to help combat new attacks, improve computer and network security and to provide consistency in language when describing attacks. A wide range of computer and network attacks are examined to provide both a survey of the field and to provide a basis on which to build the proposed taxonomy. The proposed taxonomy consists of four dimensions which provide a holistic taxonomy and to deal with inherent problems in the computer and network attack field. The first dimension covers the attack vector and the main behaviour of the attack. The second dimension allows for classification of the attack targets. Vulnerabilities are classified in the third dimension and payloads in the fourth. The taxonomy is briefly evaluated and is found to work well, with a few areas that could be improved.

[1]  Daniel Klein,et al.  Foiling the cracker: A survey of, and improvements to, password security , 1992 .

[2]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[3]  Matt Bishop,et al.  A Taxonomy of UNIX System and Network Vulnerabilities , 1997 .

[4]  H. Lipson Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues , 2002 .

[5]  Jon A. Rochlis,et al.  With microscope and tweezers: an analysis of the Internet virus of November 1988 , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[6]  Fred Cohen,et al.  Computer viruses—theory and experiments , 1990 .

[7]  Erland Jonsson,et al.  How to systematically classify computer security intrusions , 1997, S&P 1997.

[8]  Chris Anley,et al.  Advanced SQL Injection In SQL Server Applications , 2002 .

[9]  Carlo Kopp The electromagnetic bomb - a weapon of electrical mass destruction , 1996 .

[10]  Eugene H. Spafford,et al.  The internet worm program: an analysis , 1989, CCRV.

[11]  Donald F. Towsley,et al.  Code red worm propagation modeling and analysis , 2002, CCS '02.

[12]  John D. Howard,et al.  An analysis of security incidents on the Internet 1989-1995 , 1998 .

[13]  Eric Chien,et al.  BLENDED ATTACKS EXPLOITS, VULNERABILITIES AND BUFFER-OVERFLOW TECHNIQUES IN COMPUTER VIRUSES , 2002 .

[14]  Marco de Vivo,et al.  Internet security attacks at the basic levels , 1998, OPSR.

[15]  Stuart Harvey Rubin,et al.  Distributed denial of service attacks , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[16]  Eugene H. Spafford,et al.  Software vulnerability analysis , 1998 .

[17]  Hal Berghel,et al.  The Code Red Worm , 2001, CACM.

[18]  A. Householder,et al.  Computer attack trends challenge Internet security , 2002 .

[19]  Erland Jonsson,et al.  How to systematically classify computer security intrusions , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[20]  Thomas A. Longstaff,et al.  A common language for computer security incidents , 1998 .

[21]  Kevin J. Houle,et al.  Trends in Denial of Service Attack Technology , 2001 .

[22]  Wim van Eck,et al.  Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..

[23]  Matt Bishop,et al.  A Critical Analysis of Vulnerability Taxonomies , 1996 .

[24]  Andrew Smith,et al.  Digging for worms, fishing for answers , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[25]  David A. Umphress,et al.  Information leakage from optical emanations , 2002, TSEC.

[26]  D. L. Lough,et al.  A taxonomy of computer attacks with applications to wireless networks , 2001 .

[27]  R. P. Abbott,et al.  Security Analysis and Enhancements of Computer Operating Systems , 1976 .

[28]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[29]  Dennis Hollingworth,et al.  Protection Analysis: Final Report , 1978 .

[30]  Samuel Glasstone,et al.  The Effects of Nuclear Weapons , 1952 .

[31]  S. R. Subramanya,et al.  Computer viruses , 2001 .

[32]  Lee Garber Melissa Virus Creates a New Type of Threat , 1999, Computer.

[33]  Edward G. Amoroso,et al.  Fundamentals of computer security technology , 1994 .