A Taxonomy of Computer Attacks with Applications to Wireless Networks

The majority of attacks made upon modern computers have been successful due to the exploitation of the same errors and weaknesses that have plagued computer systems for the last thirty years. Because the industry has not learned from these mistakes, new protocols and systems are not designed with th...

Full description

Bibliographic Details
Main Author: Lough, Daniel Lowry
Other Authors: Electrical and Computer Engineering
Format: Others
Published: Virginia Tech 2014
Subjects:
Online Access:http://hdl.handle.net/10919/27242
http://scholar.lib.vt.edu/theses/available/etd-04252001-234145/
id ndltd-VTETD-oai-vtechworks.lib.vt.edu-10919-27242
record_format oai_dc
spelling ndltd-VTETD-oai-vtechworks.lib.vt.edu-10919-272422020-09-26T05:33:39Z A Taxonomy of Computer Attacks with Applications to Wireless Networks Lough, Daniel Lowry Electrical and Computer Engineering Davis, Nathaniel J. IV Marchany, Randolph C. Jones, Mark T. Midkiff, Scott F. Nunnally, Charles E. Brown, Ezra A. computer attack taxonomy computer security integrity flaws wireless security VERDICT IEEE 802.11 The majority of attacks made upon modern computers have been successful due to the exploitation of the same errors and weaknesses that have plagued computer systems for the last thirty years. Because the industry has not learned from these mistakes, new protocols and systems are not designed with the aspect of security in mind; and security that is present is typically added as an afterthought. What makes these systems so vulnerable is that the security design process is based upon assumptions that have been made in the past; assumptions which now have become obsolete or irrelevant. In addition, fundamental errors in the design and implementation of systems repeatedly occur, which lead to failures. This research presents a comprehensive analysis of the types of attacks that are being leveled upon computer systems and the construction of a general taxonomy and methodologies that will facilitate design of secure protocols. To develop a comprehensive taxonomy, existing lists, charts, and taxonomies of host and network attacks published over the last thirty years are examined and combined, revealing common denominators among them. These common denominators, as well as new information, are assimilated to produce a broadly applicable, simpler, and more complete taxonomy. It is shown that all computer attacks can be broken into a taxonomy consisting of improper conditions: <b>V</b>alidation <b>E</b>xposure <b>R</b>andomness <b>D</b>eallocation <b>I</b>mproper <b>C</b>onditions <b>T</b>axonomy; hence described by the acronym <b>VERDICT</b>. The developed methodologies are applicable to both wired and wireless systems, and they are applied to some existing Internet attacks to show how they can be classified under VERDICT. The methodologies are applied to the IEEE 802.11 wireless local area network protocol and numerous vulnerabilities are found. Finally, an extensive annotated bibliography is included. Ph. D. 2014-03-14T20:10:43Z 2014-03-14T20:10:43Z 2001-03-26 2001-04-25 2002-04-30 2001-04-30 Dissertation etd-04252001-234145 http://hdl.handle.net/10919/27242 http://scholar.lib.vt.edu/theses/available/etd-04252001-234145/ lough.dissertation.pdf In Copyright http://rightsstatements.org/vocab/InC/1.0/ application/pdf Virginia Tech
collection NDLTD
format Others
sources NDLTD
topic computer attack taxonomy
computer security
integrity flaws
wireless security
VERDICT
IEEE 802.11
spellingShingle computer attack taxonomy
computer security
integrity flaws
wireless security
VERDICT
IEEE 802.11
Lough, Daniel Lowry
A Taxonomy of Computer Attacks with Applications to Wireless Networks
description The majority of attacks made upon modern computers have been successful due to the exploitation of the same errors and weaknesses that have plagued computer systems for the last thirty years. Because the industry has not learned from these mistakes, new protocols and systems are not designed with the aspect of security in mind; and security that is present is typically added as an afterthought. What makes these systems so vulnerable is that the security design process is based upon assumptions that have been made in the past; assumptions which now have become obsolete or irrelevant. In addition, fundamental errors in the design and implementation of systems repeatedly occur, which lead to failures. This research presents a comprehensive analysis of the types of attacks that are being leveled upon computer systems and the construction of a general taxonomy and methodologies that will facilitate design of secure protocols. To develop a comprehensive taxonomy, existing lists, charts, and taxonomies of host and network attacks published over the last thirty years are examined and combined, revealing common denominators among them. These common denominators, as well as new information, are assimilated to produce a broadly applicable, simpler, and more complete taxonomy. It is shown that all computer attacks can be broken into a taxonomy consisting of improper conditions: <b>V</b>alidation <b>E</b>xposure <b>R</b>andomness <b>D</b>eallocation <b>I</b>mproper <b>C</b>onditions <b>T</b>axonomy; hence described by the acronym <b>VERDICT</b>. The developed methodologies are applicable to both wired and wireless systems, and they are applied to some existing Internet attacks to show how they can be classified under VERDICT. The methodologies are applied to the IEEE 802.11 wireless local area network protocol and numerous vulnerabilities are found. Finally, an extensive annotated bibliography is included. === Ph. D.
author2 Electrical and Computer Engineering
author_facet Electrical and Computer Engineering
Lough, Daniel Lowry
author Lough, Daniel Lowry
author_sort Lough, Daniel Lowry
title A Taxonomy of Computer Attacks with Applications to Wireless Networks
title_short A Taxonomy of Computer Attacks with Applications to Wireless Networks
title_full A Taxonomy of Computer Attacks with Applications to Wireless Networks
title_fullStr A Taxonomy of Computer Attacks with Applications to Wireless Networks
title_full_unstemmed A Taxonomy of Computer Attacks with Applications to Wireless Networks
title_sort taxonomy of computer attacks with applications to wireless networks
publisher Virginia Tech
publishDate 2014
url http://hdl.handle.net/10919/27242
http://scholar.lib.vt.edu/theses/available/etd-04252001-234145/
work_keys_str_mv AT loughdaniellowry ataxonomyofcomputerattackswithapplicationstowirelessnetworks
AT loughdaniellowry taxonomyofcomputerattackswithapplicationstowirelessnetworks
_version_ 1719341167274885120