Computer Science – Cryptography and Security
Scientific paper
2010-06-09
Computer Science
Cryptography and Security
CoreLabs Technical Report
Scientific paper
In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack, to describe the theater of operations, targets, missions, actions, plans and assets involved in cyberwarfare attacks. We also describe two applications of this model: autonomous planning leading to automated penetration tests, and attack simulations, allowing a system administrator to evaluate the vulnerabilities of his network.
Futoransky Ariel
Notarfrancesco Luciano
Richarte Gerardo
Sarraute Carlos
No associations
LandOfFree
Building Computer Network Attacks does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Building Computer Network Attacks, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Building Computer Network Attacks will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-490315