{"title":"Cyberattack Repository: A Web Application for the Selection and Composition of Cyberattack Models","authors":"Katia P. Maxwell, Levi Seibert","doi":"10.1145/3564746.3587012","DOIUrl":null,"url":null,"abstract":"In the area of research and the process of being innovative, researchers know that sometimes the tools that are needed are something other than what can be attained off the shelf. During research conducted in the selection and composition of cyberattack models, a prototype application was built to assist in searching for cyberattack information against specific systems. This process of selection is only one step towards learning more about cyberattacks and how organizations can defend against them. An initial prototype web application was developed, and this project has expanded the functionality of that web application to not only allow the selection of cyberattack models but also to compose them. The composition is based on two approaches, sequential or parallel. The application has also been expanded to automate the process of assembling models. A description of the design specifications of the application and additional development plans are shown.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2023 ACM Southeast Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3564746.3587012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In the area of research and the process of being innovative, researchers know that sometimes the tools that are needed are something other than what can be attained off the shelf. During research conducted in the selection and composition of cyberattack models, a prototype application was built to assist in searching for cyberattack information against specific systems. This process of selection is only one step towards learning more about cyberattacks and how organizations can defend against them. An initial prototype web application was developed, and this project has expanded the functionality of that web application to not only allow the selection of cyberattack models but also to compose them. The composition is based on two approaches, sequential or parallel. The application has also been expanded to automate the process of assembling models. A description of the design specifications of the application and additional development plans are shown.