Tuesday, October 20
2:45 PM-3:45 PM
Alii II

Misuse Patterns Survey with Relation to Network Attack Pattern

Roundtable ID: 47763
  1. aaa
    Ali Alkazimi
    Florida Atlantic University

Abstract: This paper is a report on a misuse pattern is a descriptive model of sequence messages the attacker sends to the different components of that model in order to reach a specific goal. A misuse pattern starts from the attacker’s prospective and the accomplishments of his goals in a specific architecture. It describes how the attack is performed from the point view of the attacker. It also defines and analyses the several methods of stopping the attack by suggesting different security patterns that can be applied for this specific purpose. The misuse pattern can have a descriptive way on how to trace the attack upon happening. We present here a Cipher Suite Rollback: A Misuse Pattern for the SSL/TLS Client/Server Authentication Handshake Protocol.

No presider for this session.


Conference attendees are able to comment on papers, view the full text and slides, and attend live presentations. If you are an attendee, please login to get full access.