Modeling Web Security Analysis Attacks with CySeMoL Tool

A. Abdulhameed, R. Al-azawi, Basil Al-Mahdawi
{"title":"Modeling Web Security Analysis Attacks with CySeMoL Tool","authors":"A. Abdulhameed, R. Al-azawi, Basil Al-Mahdawi","doi":"10.23851/mjs.v31i3.876","DOIUrl":null,"url":null,"abstract":"The utilize of the web has made humans and companies powerless to exterior assaults. Indeed, cyber problems essentially influence information frameworks with distinctive types of malicious attacks such as spyware, virus, social engineering, etc. The Internet e-mail service, in particular, has become one of the most dependable methods of communication among people, institutions, and companies. The development of digital signatures to e-mail services has raised the e-mail security, which led to replacing the standard mailing of registered letters. Unfortunately, the process of sending and receiving e-mails has created a negative impact means on security and privacy from cybercriminals by diffusing spam and malware. As a result, e-mail hosts are constantly under attack by malicious programs that are often attached to e-mails. In this paper, the simulation model and prototype of an email traffic monitor developed and tested in order to prove the ability of our proposed method for detecting new viruses. This paper states the success possibility of this new method based on the simulation results. The results of the analysis suggest that the Cyber Security Modeling Language (CySeMoL) model has a good performance of operating system vulnerability prediction. At last, some useful suggestions in the context of the CySeMoL model are presented.","PeriodicalId":7515,"journal":{"name":"Al-Mustansiriyah Journal of Sciences","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2020-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Al-Mustansiriyah Journal of Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23851/mjs.v31i3.876","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The utilize of the web has made humans and companies powerless to exterior assaults. Indeed, cyber problems essentially influence information frameworks with distinctive types of malicious attacks such as spyware, virus, social engineering, etc. The Internet e-mail service, in particular, has become one of the most dependable methods of communication among people, institutions, and companies. The development of digital signatures to e-mail services has raised the e-mail security, which led to replacing the standard mailing of registered letters. Unfortunately, the process of sending and receiving e-mails has created a negative impact means on security and privacy from cybercriminals by diffusing spam and malware. As a result, e-mail hosts are constantly under attack by malicious programs that are often attached to e-mails. In this paper, the simulation model and prototype of an email traffic monitor developed and tested in order to prove the ability of our proposed method for detecting new viruses. This paper states the success possibility of this new method based on the simulation results. The results of the analysis suggest that the Cyber Security Modeling Language (CySeMoL) model has a good performance of operating system vulnerability prediction. At last, some useful suggestions in the context of the CySeMoL model are presented.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
用CySeMoL工具建模Web安全分析攻击
网络的使用使人类和公司对外部攻击无能为力。事实上,网络问题本质上是通过不同类型的恶意攻击(如间谍软件、病毒、社会工程等)影响信息框架。尤其是互联网电子邮件服务,已经成为人们、机构和公司之间最可靠的通信方式之一。电子邮件服务中数字签名的发展提高了电子邮件的安全性,从而取代了传统的挂号信邮寄方式。不幸的是,发送和接收电子邮件的过程通过传播垃圾邮件和恶意软件,对网络罪犯的安全和隐私造成了负面影响。因此,电子邮件主机经常受到附加在电子邮件中的恶意程序的攻击。本文开发并测试了电子邮件流量监视器的仿真模型和原型,以证明我们提出的方法检测新病毒的能力。根据仿真结果,阐述了该方法成功的可能性。分析结果表明,网络安全建模语言(cysyemol)模型具有较好的操作系统漏洞预测性能。最后,针对CySeMoL模型提出了一些有用的建议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Analysis The Intensity of CO2 Emissions from Fossil Fuel Combustion in Iraq Rainwater Harvesting Using GIS Technique: A Case Study of Diyala Governorate, Iraq Climate index; Cold events; Extreme; Precipitations. Modelling Heat Transfer in Solar Distiller with Additional Condenser Studying Monitoring the Land Covers Around Al- Razaza Lake/ Iraq Based Upon Multi-Temporal Analysis Technique
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1