WIT Press

Modeling Attacks

Price

Free (open access)

Volume

Volume 4 (2014), Issue 2

Pages

18

Page Range

97 - 115

Paper DOI

10.2495/SAFE-V4-N2-97-115

Copyright

WIT Press

Author(s)

S. AL-FEDAGHI & SAMER MOEIN

Abstract

The aim of this paper is to develop a general conceptual model of attack progression that can be applied to modeling of computer and communication threat risks. This paper focuses on attacks that aim at overpowering the victim/prey to gain some benefit. It examines existing models and introduces a new flow model to facilitate development of a general model of two-sided combat. The symmetry between the attacker’s and defender’s flow systems of signals, information, plans, decisions, and actions results in a single combat model incorporating the realms of both attacker and defender. Based on this conceptualization, it is possible to characterize the weak points and develop a map of vulnerabilities in the defender’s system. Such a methodology of attack modeling provides a base for analysis in the fields of threat modeling and secure software development. Finally, this new model is applied to an SQL injection problem in web services to demonstrate implementation of a real system problem.

Keywords

Attacks, conceptual model, security, SQL injection, threat risk