The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

A Taxonomy of Computer Attacks wityh Applications to Wireless Networks

Author

Daniel Lowry Lough

Entry type

phdthesis

Abstract

The majority of attacks made upon modern computers have been successful due to the exploitation of the same errors and weaknesses that have plagued computer systems for the last thirty years. Because the industry has not learned from these mistakes, new protocols and systemns are not designed with the aspect of security in mind; and security that is present is typically added as an afterthought. What makes these systems so vulnerable is that the security design process is based upon assumptions that have been made in the past; assumptions which now have become obsolete or irrelevant. In addition, fundamental errors in the design an implementation of systems repeatedly occr, which lead to failures. This research presents a comprehensive analysis of the types of attacks that are being leveled upon computer systems and the construction of a general taxonomy and methodologies that will facilitate design of secure protocols. To develop a coomprehensive taxonomy, existing lists, charts, and taxonomies of host and network attacks published over the last thirty years are examined and combned, revealing common denominators among them. These common denominators, as well as new information, are assimilated to produce a broadly applicable, simplier, and more complete taxonomy. It is shown that all computer attacks can be broken into taxonomy consisting of improper conditions: Validation Exposure Randomness Deallocation Improper Conditions Taxonomy; hence described by the acronym VERDICT. The developed methodologies are applicable to both wired and wireless systems, and they are applied to some existing Internet attacks to show how they can be classified under VERDICT. The methodologies are applied to the IEEE 802.11 wireless local area network protocol and numerous vulnerabilities are found. Finally, an extensive annotated bibliography is included.

Key alpha

Lough

Note

April 2001

Pages

1-348

School

Virginia

Publication Date

1900-01-01

Contents

1 Introduction 2 Background and Literature Survey 3 Computer Attack Taxonomies 4 Operating System Integrity Flaws 5 VERDICT 6 Verification of VERDICT 7 Methodologies of VERDICT 8 Application of VERDICT to IEEE 802.11 9 Conclusions

Keywords

VERDICT, Validation Exposure Randomness Deallocation Improper Conditions Taxonomy

Language

English

Location

A hard-copy of this is in REC 216

BibTex-formatted data

To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.