DAG-based attack and defense modeling: Don't miss the forest for the attack trees

B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …

APT datasets and attack modeling for automated detection methods: A review

B Stojanović, K Hofer-Schmitz, U Kleb - Computers & Security, 2020 - Elsevier
Automated detection methods for targeted cyber attacks are getting more and more
prominent. In order to test these methods properly, it is crucial to have a suitable dataset …

A measurement study on linux container security: Attacks and countermeasures

X Lin, L Lei, Y Wang, J Jing, K Sun… - Proceedings of the 34th …, 2018 - dl.acm.org
Linux container mechanism has attracted a lot of attention and is increasingly utilized to
deploy industry applications. Though it is a consensus that the container mechanism is not …

On the security of containers: Threat modeling, attack analysis, and mitigation strategies

AY Wong, EG Chekole, M Ochoa, J Zhou - Computers & Security, 2023 - Elsevier
Traditionally, applications that are used in large and small enterprises were deployed on
“bare metal” servers installed with operating systems. Recently, the use of multiple virtual …

Cyber-attack modeling analysis techniques: An overview

H Al-Mohannadi, Q Mirza, A Namanya… - 2016 IEEE 4th …, 2016 - ieeexplore.ieee.org
Cyber attack is a sensitive issue in the world of Internet security. Governments and business
organisations around the world are providing enormous effort to secure their data. They are …

Building situational awareness for network threats in fog/edge computing: Emerging paradigms beyond the security perimeter model

R Rapuzzi, M Repetto - Future Generation Computer Systems, 2018 - Elsevier
The growing interest in fog and edge computing is gradually but inexorably outlining new
architectural and usage models, distinguished by geographical dispersion and device …

Cyber threat intelligence from honeypot data using elasticsearch

H Almohannadi, I Awan, J Al Hamar… - 2018 IEEE 32nd …, 2018 - ieeexplore.ieee.org
Cyber attacks are increasing in every aspect of daily life. There are a number of different
technologies around to tackle cyber-attacks, such as Intrusion Detection Systems (IDS) …

Defending against web application attacks: Approaches, challenges and implications

D Mitropoulos, P Louridas… - … on Dependable and …, 2017 - ieeexplore.ieee.org
Some of the most dangerous web attacks, such as Cross-Site Scripting and sql injection,
exploit vulnerabilities in web applications that may accept and process data of uncertain …

Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation

FT Chimuco, JBF Sequeiros, CG Lopes… - International Journal of …, 2023 - Springer
The adoption and popularization of mobile devices, such as smartphones and tablets,
accentuated after the second decade of this century, has been motivated by the growing …

Threat modeling of internet of things health devices

A Omotosho, B Ayemlo Haruna… - Journal of Applied …, 2019 - Taylor & Francis
For a number of health conditions, the number of Internet of Things (IoT) devices available
for self and remote monitoring are growing rapidly, and users are also increasing. In the …