Computer System Attack Classification
Abstract
The computer system security modeling needs a numerical attack severity evaluation. Some hypothetical attack severity values are usually used. With the aim to make modeling more accurate and to expand the model abilities it is necessary to relate numerical values used in modeling with real attacks and their classes. In this article most popular attack classifications have been analyzed and the computer system attack classification covering 14 aspects of the attack and suitable for future research is suggested. The method of the attack severity numerical evaluation applying the computer system attack classification using a 5 level attack severity numerical evaluation, based on the attack objective, is suggested. Ill. 1, bibl. 14 (in Lithuanian; summary in Englishб Russian and Lithuanian).
Downloads
Published
How to Cite
Issue
Section
License
The copyright for the paper in this journal is retained by the author(s) with the first publication right granted to the journal. The authors agree to the Creative Commons Attribution 4.0 (CC BY 4.0) agreement under which the paper in the Journal is licensed.
By virtue of their appearance in this open access journal, papers are free to use with proper attribution in educational and other non-commercial settings with an acknowledgement of the initial publication in the journal.