Attack Evolution: Identifying Attack Evolution Characteristics to Predict Future Attacks
dc.contributor.advisor | Cukier, Michel | en_US |
dc.contributor.author | Monahan-Pendergast, MaryTheresa | en_US |
dc.contributor.department | ISR | en_US |
dc.date.accessioned | 2007-05-23T10:18:50Z | |
dc.date.available | 2007-05-23T10:18:50Z | |
dc.date.issued | 2006 | en_US |
dc.description.abstract | Several approaches can be considered to predict the evolution of computer security attacks, such as statistical approaches and ed Teams. This research proposes a third and completely novel approach for predicting the evolution of an attack threat. Our goal is to move from the destructive nature and malicious intent associated with an attack to the root of what an attack creation is: having successfully solved a complex problem. By approaching attacks from the perspective of the creator, we will chart the way in which attacks are developed over time and attempt to extract evolutionary patterns. These patterns will eventually be used for the prediction of future attacks. | en_US |
dc.format.extent | 132808 bytes | |
dc.format.mimetype | application/pdf | |
dc.identifier.uri | http://hdl.handle.net/1903/6604 | |
dc.language.iso | en_US | en_US |
dc.relation.ispartofseries | ISR; UG 2006-6 | en_US |
dc.subject | Societal Infrastructure Systems | en_US |
dc.title | Attack Evolution: Identifying Attack Evolution Characteristics to Predict Future Attacks | en_US |
dc.type | Thesis | en_US |
Files
Original bundle
1 - 1 of 1