O'Reilly logo

Modeling and Simulation of Computer Networks and Systems by Petros Nicopolitidis, Faouzi Zarai, Mohammad S. Obaidat

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 29

Formal methods of attack modeling and detection

Tarik Guelzim and Mohammad S. Obaidat,    Monmouth University, West Long Branch, NJ, USA

In recent years, pervasive computing has changed the way we interact with information. The multitude of connected devices as well as machines has demanded fast, robust and mostly secure information systems. As computer attacks have taken new dimensions with changing complexity, developing formal methods to model them has become a necessity. Formal methods allow understanding an attack vector before it occurs and implementing measures to thwart it, as well as assessing the damage it has caused based on live data analysis if it was successful. In this chapter, we present an introduction of computer ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required