Taxonomies of attacks and vulnerabilities in computer systems

VM Igure, RD Williams - IEEE Communications Surveys & …, 2008 - ieeexplore.ieee.org
Security assessment of a system is a difficult problem. Most of the current efforts in security
assessment involve searching for known vulnerabilities. Finding unknown vulnerabilities still …

Revisiting QUIC attacks: A comprehensive review on QUIC security and a hands-on study

E Chatzoglou, V Kouliaridis, G Karopoulos… - International Journal of …, 2023 - Springer
Built on top of UDP, the recently standardized QUIC protocol primarily aims to gradually
replace the TCP plus TLS plus HTTP/2 model. For instance, HTTP/3 is designed to exploit …

Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective

UPD Ani, H He, A Tiwari - Journal of Cyber Security Technology, 2017 - Taylor & Francis
Nowadays, the industrial sector is being challenged by several cybersecurity concerns.
Direct attacks by malicious persons and (or) software form part of the severe jeopardies of …

Diverse firewall design

AX Liu, MG Gouda - IEEE Transactions on parallel and …, 2008 - ieeexplore.ieee.org
Firewalls are the mainstay of enterprise security and the most widely adopted technology for
protecting private networks. An error in a firewall policy either creates security holes that will …

Structured firewall design

MG Gouda, AX Liu - Computer networks, 2007 - Elsevier
A firewall is a security guard placed at the point of entry between a private network and the
outside Internet such that all incoming and outgoing packets have to pass through it. The …

Privacy-preserving decision trees over vertically partitioned data

J Vaidya, C Clifton - IFIP Annual Conference on Data and Applications …, 2005 - Springer
Privacy and security concerns can prevent sharing of data, derailing data mining projects.
Distributed knowledge discovery, if done correctly, can alleviate this problem. In this paper …

Performance modeling and analysis of network firewalls

K Salah, K Elbadawi, R Boutaba - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Network firewalls act as the first line of defense against unwanted and malicious traffic
targeting Internet servers. Predicting the overall firewall performance is crucial to network …

Off-path TCP sequence number inference attack-how firewall middleboxes reduce security

Z Qian, ZM Mao - 2012 IEEE Symposium on Security and …, 2012 - ieeexplore.ieee.org
In this paper, we report a newly discovered" off-path TCP sequence number inference"
attack enabled by firewall middle boxes. It allows an off-path (ie, not man-in-the-middle) …

Brain Computer Interface issues on hand movement

PK Pattnaik, J Sarraf - Journal of King Saud University …, 2018 - cntttest.vanlanguni.edu.vn
All the higher order ANNs (HONNs) including functional link ANN (FLANN) are sensitive to
random initialization of weight and rely on the learning algorithms adopted. Although a …

Empirical analysis of system-level vulnerability metrics through actual attacks

H Holm, M Ekstedt, D Andersson - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
The Common Vulnerability Scoring System (CVSS) is a widely used and well-established
standard for classifying the severity of security vulnerabilities. For instance, all vulnerabilities …