13.07.2015 Views

GRAFOS

GRAFOS

GRAFOS

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

MotivationSome attacksTraffic analysis, Active eavesdropping, Unauthorized Service(DoSDoS),Man-in-the-Middle(MITM),Smurf, Syn Floodaccess, Denial-of-Modelling attacks and vulnerabilities(1)Formal models: petri nets or UML(2)Attacks trees-they focus on goals that can be transformed on attacks against protocolimplementation;-they allow to describe the actions that should be performed for a successfulattack;-the model is easy to understand;-they allow a hierarchical representation in which high level goals are brokendown in sub-goals, until the desired refinement level is achieved;-is possible to define attack patterns based on most common attacks to a givenprotocol.MARCO ANTONIO GARCIA DE CARVALHOMarço de 2010Grafos e Aplicações

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!