This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Toward an Automated Attack Model for Red Teams
July/August 2005 (vol. 3 no. 4)
pp. 18-25
Helayne T. Ray, SI Government Solutions
Raghunath Vemuri, Motorola
Hariprasad R. Kantubhukta, Progressive Insurance
To better understand system vulnerabilities, proactive security services use red teams that simulate malicious attacks. The authors contend that an attack model with UML-based use cases, sequence and state chart diagrams, and XML would best help red teams achieve attack automation.
Index Terms:
Red Teams, XML, vulnerabilities
Citation:
Helayne T. Ray, Raghunath Vemuri, Hariprasad R. Kantubhukta, "Toward an Automated Attack Model for Red Teams," IEEE Security & Privacy, vol. 3, no. 4, pp. 18-25, July-Aug. 2005, doi:10.1109/MSP.2005.111
Usage of this product signifies your acceptance of the Terms of Use.