Chapter 29

Formal methods of attack modeling and detection

Tarik Guelzim and Mohammad S. Obaidat,    Monmouth University, West Long Branch, NJ, USA

In recent years, pervasive computing has changed the way we interact with information. The multitude of connected devices as well as machines has demanded fast, robust and mostly secure information systems. As computer attacks have taken new dimensions with changing complexity, developing formal methods to model them has become a necessity. Formal methods allow understanding an attack vector before it occurs and implementing measures to thwart it, as well as assessing the damage it has caused based on live data analysis if it was successful. In this chapter, we present an introduction of computer ...

Get Modeling and Simulation of Computer Networks and Systems now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.