Avoiditals: Enhanced Cyber-Attack Taxonomy In Securing Information Technology Infrastructure

An operation of an organization is currently using a digital environment which opens to potential cyber-attacks. These phenomena become worst as the cyberattack landscape is changing rapidly. The impact of cyber-attacks varies depending on the scope of the organization and the value of assets that n...

Full description

Saved in:
Bibliographic Details
Main Authors: Selamat, Siti Rahayu, Syafrizal, Melwin, Zakaria, Nurul Azma
Format: Article
Language:English
Published: IJCSNS 2021
Online Access:http://eprints.utem.edu.my/id/eprint/25763/2/IJCSNS%20-%20WOS.PDF
http://eprints.utem.edu.my/id/eprint/25763/
https://www.koreascience.or.kr/article/JAKO202127452931439.pdf
https://doi.org/10.22937/IJCSNS.2021.21.8.1
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknikal Malaysia Melaka
Language: English
id my.utem.eprints.25763
record_format eprints
spelling my.utem.eprints.257632022-03-16T16:20:49Z http://eprints.utem.edu.my/id/eprint/25763/ Avoiditals: Enhanced Cyber-Attack Taxonomy In Securing Information Technology Infrastructure Selamat, Siti Rahayu Syafrizal, Melwin Zakaria, Nurul Azma An operation of an organization is currently using a digital environment which opens to potential cyber-attacks. These phenomena become worst as the cyberattack landscape is changing rapidly. The impact of cyber-attacks varies depending on the scope of the organization and the value of assets that need to be protected. It is difficult to assess the damage to an organization from cyberattacks due to a lack of understanding of tools, metrics, and knowledge on the type of attacks and their impacts. Hence, this paper aims to identify domains and sub-domains of cyber-attack taxonomy to facilitate the understanding of cyber-attacks. Four phases are carried in this research: identify existing cyber-attack taxonomy, determine and classify domains and sub-domains of cyber-attack, and construct the enhanced cyber-attack taxonomy. The existing cyber-attack taxonomies are analyzed, domains and sub-domains are selected based on the focus and objectives of the research, and the proposed taxonomy named AVOIDITALS Cyber-attack Taxonomy is constructed. AVOIDITALS consists of 8 domains, 105 sub-domains, 142 sub-sub-domains, and 90 other sub-sub-domains that act as a guideline to assist administrators in determining cyber-attacks through cyber-attacks pattern identification that commonly occurred on digital infrastructure and provide the best prevention method to minimize impact. This research can be further developed in line with the emergence of new types and categories of current cyberattacks and the future. IJCSNS 2021-08 Article PeerReviewed text en http://eprints.utem.edu.my/id/eprint/25763/2/IJCSNS%20-%20WOS.PDF Selamat, Siti Rahayu and Syafrizal, Melwin and Zakaria, Nurul Azma (2021) Avoiditals: Enhanced Cyber-Attack Taxonomy In Securing Information Technology Infrastructure. International Journal of Computer Science and Network Security, 21 (8). pp. 1-12. ISSN 1738-7906 https://www.koreascience.or.kr/article/JAKO202127452931439.pdf https://doi.org/10.22937/IJCSNS.2021.21.8.1
institution Universiti Teknikal Malaysia Melaka
building UTEM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknikal Malaysia Melaka
content_source UTEM Institutional Repository
url_provider http://eprints.utem.edu.my/
language English
description An operation of an organization is currently using a digital environment which opens to potential cyber-attacks. These phenomena become worst as the cyberattack landscape is changing rapidly. The impact of cyber-attacks varies depending on the scope of the organization and the value of assets that need to be protected. It is difficult to assess the damage to an organization from cyberattacks due to a lack of understanding of tools, metrics, and knowledge on the type of attacks and their impacts. Hence, this paper aims to identify domains and sub-domains of cyber-attack taxonomy to facilitate the understanding of cyber-attacks. Four phases are carried in this research: identify existing cyber-attack taxonomy, determine and classify domains and sub-domains of cyber-attack, and construct the enhanced cyber-attack taxonomy. The existing cyber-attack taxonomies are analyzed, domains and sub-domains are selected based on the focus and objectives of the research, and the proposed taxonomy named AVOIDITALS Cyber-attack Taxonomy is constructed. AVOIDITALS consists of 8 domains, 105 sub-domains, 142 sub-sub-domains, and 90 other sub-sub-domains that act as a guideline to assist administrators in determining cyber-attacks through cyber-attacks pattern identification that commonly occurred on digital infrastructure and provide the best prevention method to minimize impact. This research can be further developed in line with the emergence of new types and categories of current cyberattacks and the future.
format Article
author Selamat, Siti Rahayu
Syafrizal, Melwin
Zakaria, Nurul Azma
spellingShingle Selamat, Siti Rahayu
Syafrizal, Melwin
Zakaria, Nurul Azma
Avoiditals: Enhanced Cyber-Attack Taxonomy In Securing Information Technology Infrastructure
author_facet Selamat, Siti Rahayu
Syafrizal, Melwin
Zakaria, Nurul Azma
author_sort Selamat, Siti Rahayu
title Avoiditals: Enhanced Cyber-Attack Taxonomy In Securing Information Technology Infrastructure
title_short Avoiditals: Enhanced Cyber-Attack Taxonomy In Securing Information Technology Infrastructure
title_full Avoiditals: Enhanced Cyber-Attack Taxonomy In Securing Information Technology Infrastructure
title_fullStr Avoiditals: Enhanced Cyber-Attack Taxonomy In Securing Information Technology Infrastructure
title_full_unstemmed Avoiditals: Enhanced Cyber-Attack Taxonomy In Securing Information Technology Infrastructure
title_sort avoiditals: enhanced cyber-attack taxonomy in securing information technology infrastructure
publisher IJCSNS
publishDate 2021
url http://eprints.utem.edu.my/id/eprint/25763/2/IJCSNS%20-%20WOS.PDF
http://eprints.utem.edu.my/id/eprint/25763/
https://www.koreascience.or.kr/article/JAKO202127452931439.pdf
https://doi.org/10.22937/IJCSNS.2021.21.8.1
_version_ 1728055214672445440