The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July/August (2005 vol.3)
pp: 18-25
Helayne T. Ray , SI Government Solutions
Raghunath Vemuri , Motorola
Hariprasad R. Kantubhukta , Progressive Insurance
ABSTRACT
To better understand system vulnerabilities, proactive security services use red teams that simulate malicious attacks. The authors contend that an attack model with UML-based use cases, sequence and state chart diagrams, and XML would best help red teams achieve attack automation.
INDEX TERMS
Red Teams, XML, vulnerabilities
CITATION
Helayne T. Ray, Raghunath Vemuri, Hariprasad R. Kantubhukta, "Toward an Automated Attack Model for Red Teams", IEEE Security & Privacy, vol.3, no. 4, pp. 18-25, July/August 2005, doi:10.1109/MSP.2005.111
15 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool