{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T19:59:42Z","timestamp":1726171182553},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2008]]},"DOI":"10.1109\/comst.2008.4483667","type":"journal-article","created":{"date-parts":[[2008,4,10]],"date-time":"2008-04-10T15:00:26Z","timestamp":1207839626000},"page":"6-19","source":"Crossref","is-referenced-by-count":86,"title":["Taxonomies of attacks and vulnerabilities in computer systems"],"prefix":"10.1109","volume":"10","author":[{"given":"Vinay","family":"Igure","sequence":"first","affiliation":[]},{"given":"Ronald","family":"Williams","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1145\/863955.863968","article-title":"Denial-of-Service: A Framework for Classifying Denial of Service Attacks","author":"hussain","year":"2003","journal-title":"Proc Conf Apps Tech Architectures and Protocols for Comp Commun"},{"key":"ref32","volume":"lncs 3421","author":"kumar","year":"2005","journal-title":"Lecture Notes in Comp Sci"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.11.004"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/332051.332797"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/32.481513"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.140"},{"key":"ref1s","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.1955.0005"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.162"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00512-1"},{"key":"ref57a","article-title":"Protection","author":"lampson","year":"1971","journal-title":"Proc 5th Princeton Conf Info Sci and Sys"},{"key":"ref57b","first-page":"18","year":"1974","journal-title":"ACM Op Sys Rev 8"},{"key":"ref60","year":"0","journal-title":"TCP SYN flooding and IP spoofing attacks"},{"key":"ref62","first-page":"493","article-title":"Methodology for Network Communication Vulnerability Analysis","volume":"2","author":"ristenbatt","year":"1988","journal-title":"MILCOM"},{"key":"ref61","year":"0","journal-title":"Smurf IP Denial-of-Service Attacks"},{"key":"ref63","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1049\/cp:19970436","article-title":"network security-a taxonomic view","author":"jayaram","year":"1997","journal-title":"European Conference on Security and Detection - ECOS97 Incorporating the One Day Symposium on Technology Used for Combatting Fraud (Conf Publ No 437)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311881"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/SMCSIA.2003.1232404"},{"key":"ref27","author":"kumar","year":"1995","journal-title":"Classification and detection of computer intrusions"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/378444.378449"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.3"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2000.839316"},{"key":"ref67","first-page":"168","article-title":"A Vulnerability Taxonomy for Network Protocols: Corresponding Engineering Best Practice Countermeasures","author":"pothamsetty","year":"2004","journal-title":"Proc 3rd IASTED Int'l Conf Commun Internet and Info Tech"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1632661"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/185403.185412"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1264858"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(97)88289-2"},{"key":"ref22","first-page":"1087","article-title":"Computer System Security Evaluation","volume":"47","author":"neumann","year":"1978","journal-title":"Proc Nat l Computer Conf"},{"key":"ref21","author":"neumann","year":"1975","journal-title":"A provably secure operating system"},{"key":"ref24","author":"neumann","year":"1995","journal-title":"Computer Related Risks"},{"key":"ref23","first-page":"396","article-title":"A Summary of Computer Misuse Techniques","author":"neumann","year":"1989","journal-title":"Proc of the 12th Nat'l Comp Sec Conf"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/2.683009"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.06.011"},{"key":"ref50","author":"krsul","year":"1998","journal-title":"Software Vulnerability Analysis"},{"key":"ref51","author":"aslam","year":"1995","journal-title":"A Taxonomy of Security Faults in the UNIX operating system"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862473"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/RAMS.2006.1677355"},{"key":"ref56","first-page":"596","article-title":"A New Vulnerability Taxonomy Based on Privilege Escalation","author":"yongzheng","year":"2004","journal-title":"Proc 6th Int Conf Enterprise Inf Syst"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2006.151"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.159"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/777313.777315"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00310-9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508180"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S1363-4127(03)00005-0"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.87"},{"key":"ref12","year":"0"},{"key":"ref13","year":"0","journal-title":"Common Vulnerabilities and Exposures List"},{"key":"ref14","first-page":"125","article-title":"Vulnerabilities Analysis","author":"bishop","year":"1999","journal-title":"Proc 2nd Int l Symp Recent Advances in Intrusion Detection"},{"key":"ref15","author":"lough","year":"2001","journal-title":"A taxonomy of computer attacks with applications to wireless networks"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1147\/sj.151.0102"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.1984.6370265"},{"key":"ref18","first-page":"11","author":"brinkley","year":"1995","journal-title":"Information Security An Integrated Collection of Essays"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(97)85785-9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1281240"},{"key":"ref3","author":"bisbey","year":"1978","journal-title":"Protection Analysis Final Report"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.2172\/751004"},{"key":"ref5","year":"0","journal-title":"Merriam-Webster Online Dictionary"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601330"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2002.1167766"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1994.315935"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1147\/sj.133.0230"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2004.1437840"},{"key":"ref48","author":"bishop","year":"1995","journal-title":"A Taxonomy of UNIX System and Network Vulnerabilities"},{"key":"ref47","doi-asserted-by":"crossref","DOI":"10.6028\/NBS.IR.76-1041","author":"abbott","year":"1976","journal-title":"Security Analysis and Enhancements of Computer Operating Systems"},{"key":"ref42","first-page":"385","article-title":"A Taxonomy for Attacks on Mobile Agent","volume":"2","author":"man","year":"2001","journal-title":"Eurocon 2001"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1023875.1023881"},{"key":"ref44","article-title":"Categorization of Software Errors that Led to Security Breaches","author":"du","year":"1998","journal-title":"Proc 21st Nat'I Info Sys Sec Conf"},{"key":"ref43","article-title":"Integration of an Internet Attack Simulator in an HLA Environment","author":"mostow","year":"2000","journal-title":"Proc IEEE Wksp Info Assurance and Sec"}],"container-title":["IEEE Communications Surveys & Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9739\/4483664\/04483667.pdf?arnumber=4483667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,24]],"date-time":"2024-02-24T19:43:03Z","timestamp":1708803783000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4483667"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":70,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/comst.2008.4483667","relation":{},"ISSN":["1553-877X"],"issn-type":[{"value":"1553-877X","type":"print"}],"subject":[],"published":{"date-parts":[[2008]]}}}