The development of a database taxonomy of vulnerabilities to support the study of denial of service attacks

作者: Thomas Winfred Richardson

DOI: 10.31274/RTD-180813-12046

关键词:

摘要: As computer networks continue to proliferate, the world's dependence on a secure communication infrastructure is of prime importance. Disruption service through Denial Service (DoS) attacks can result in great financial loss for Internet-based companies and major inconveniences users Internet services. The purpose this two-year study was understand network denial so that methods may be developed detect prevent them. Initially, researcher constructed database system exploits revealed underlying vulnerabilities software or protocols they attack. populated with posted at popular reporting sites such as Rootshell, Bugtraq, Security Focus. To encourage use common vulnerability taxonomy facilitate sharing data, parts classification scheme proposed by Krsul (1998) his research were included, well developing tree based current research. Sifting reports categorizing has been challenging experience; creating categories are unambiguous, repeatable, exhaustive proven difficult task. results two three useful vulnerabilities. next phase project look any clustering these categories, determine if effective countermeasures deployed against Although past history no guarantee future exploit activity, it hoped 630 will remain valid DoS attacks. Toward goal, made data mining packages plot various interrelationships could more easily discovered studied. A sampling plots, an interpretation plotted part creation presented

参考文章(23)
Van C. Van, A Defense Against Address Spoofing Using Active Networks Massachusetts Institute of Technology. ,(1997)
Eugene H. Spafford, Ivan Krsul, Taimur Aslam, Use of A Taxonomy of Security Faults ,(1996)
D. Schnackenberg, K. Djahandari, D. Sterne, Infrastructure for intrusion detection and response darpa information survivability conference and exposition. ,vol. 2, pp. 3- 11 ,(2000) , 10.1109/DISCEX.2000.821505
Matt Bishop, David Bailey, A Critical Analysis of Vulnerability Taxonomies Defense Technical Information Center. ,(1996) , 10.21236/ADA453251
Eugene H. Spafford, Ivan Victor Krsul, Software vulnerability analysis Purdue University. ,(1998)
Steven Bellovin, Marcus Leech, Tom Taylor, ICMP Traceback Messages Internet Draft: draft-bellovin-itrace-00. txt. ,(2003) , 10.7916/D8FF406R
D. Senie, P. Ferguson, Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing RFC 2827-BCP 38. ,vol. 2267, pp. 1- 10 ,(1998)
Carl E. Landwehr, Alan R. Bull, John P. McDermott, William S. Choi, A Taxonomy of Computer Program Security Flaws, with Examples Defense Technical Information Center. ,(1994) , 10.21236/ADA465587