A requires/provides model for computer attacks

May 31, 2017 | Autor: Karl Levitt | Categoría: Intrusion Detection, Vulnerability Analysis
Share Embed


Descripción

Computer attacks are typically described in terms of a single exploited vulnerability or as a signature composed of a specific sequence of events. These approaches lack the ability to characterize complex scenarios or to generalize to unknown attacks. Rather than think of attacks as a series of events, we view attacks as a set of capabilities that provide support for
Lihat lebih banyak...

Comentarios

Copyright © 2017 DATOSPDF Inc.