Show simple item record

dc.contributor.advisorCukier, Michelen_US
dc.contributor.authorMonahan-Pendergast, MaryTheresaen_US
dc.date.accessioned2007-05-23T10:18:50Z
dc.date.available2007-05-23T10:18:50Z
dc.date.issued2006en_US
dc.identifier.urihttp://hdl.handle.net/1903/6604
dc.description.abstractSeveral approaches can be considered to predict the evolution of computer security attacks, such as statistical approaches and ed Teams. This research proposes a third and completely novel approach for predicting the evolution of an attack threat. Our goal is to move from the destructive nature and malicious intent associated with an attack to the root of what an attack creation is: having successfully solved a complex problem. By approaching attacks from the perspective of the creator, we will chart the way in which attacks are developed over time and attempt to extract evolutionary patterns. These patterns will eventually be used for the prediction of future attacks.en_US
dc.format.extent132808 bytes
dc.format.mimetypeapplication/pdf
dc.language.isoen_USen_US
dc.relation.ispartofseriesISR; UG 2006-6en_US
dc.subjectSocietal Infrastructure Systemsen_US
dc.titleAttack Evolution: Identifying Attack Evolution Characteristics to Predict Future Attacksen_US
dc.typeThesisen_US
dc.contributor.departmentISRen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record