Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Al-Mustansiriyah journal of science, 2020-08, Vol.31 (3), p.101-109
2020

Details

Autor(en) / Beteiligte
Titel
Modeling Web Security Analysis Attacks with CySeMoL Tool
Ist Teil von
  • Al-Mustansiriyah journal of science, 2020-08, Vol.31 (3), p.101-109
Ort / Verlag
Al-Mustansiriyah University
Erscheinungsjahr
2020
Link zum Volltext
Quelle
EZB Electronic Journals Library
Beschreibungen/Notizen
  • The utilize of the web has made humans and companies powerless to exterior assaults. Indeed, cyber problems essentially influence information frameworks with distinctive types of malicious attacks such as spyware, virus, social engineering, etc. The Internet e-mail service, in particular, has become one of the most dependable methods of communication among people, institutions, and companies. The development of digital signatures to e-mail services has raised the e-mail security, which led to replacing the standard mailing of registered letters. Unfortunately, the process of sending and receiving e-mails has created a negative impact means on security and privacy from cybercriminals by diffusing spam and malware. As a result, e-mail hosts are constantly under attack by malicious programs that are often attached to e-mails. In this paper, the simulation model and prototype of an email traffic monitor developed and tested in order to prove the ability of our proposed method for detecting new viruses. This paper states the success possibility of this new method based on the simulation results. The results of the analysis suggest that the Cyber Security Modeling Language (CySeMoL) model has a good performance of operating system vulnerability prediction. At last, some useful suggestions in the context of the CySeMoL model are presented.
Sprache
Arabisch
Identifikatoren
ISSN: 1814-635X
eISSN: 2521-3520
DOI: 10.23851/mjs.v31i3.876
Titel-ID: cdi_doaj_primary_oai_doaj_org_article_d399ed3907b440e39a4c059bbef34a11

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX