{"id":"https://openalex.org/W2044072360","doi":"https://doi.org/10.5539/cis.v7n3p18","title":"A Revised Attack Taxonomy for a New Generation of Smart Attacks","display_name":"A Revised Attack Taxonomy for a New Generation of Smart Attacks","publication_year":2014,"publication_date":"2014-07-07","ids":{"openalex":"https://openalex.org/W2044072360","doi":"https://doi.org/10.5539/cis.v7n3p18","mag":"2044072360"},"language":"en","primary_location":{"id":"doi:10.5539/cis.v7n3p18","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v7n3p18","pdf_url":"http://www.ccsenet.org/journal/index.php/cis/article/download/35625/21412","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"http://www.ccsenet.org/journal/index.php/cis/article/download/35625/21412","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111886592","display_name":"Robert Koch","orcid":null},"institutions":[{"id":"https://openalex.org/I40527276","display_name":"Universit\u00e4t der Bundeswehr M\u00fcnchen","ror":"https://ror.org/05kkv3f82","country_code":"DE","type":"education","lineage":["https://openalex.org/I1315109972","https://openalex.org/I40527276","https://openalex.org/I4387152969"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Robert Koch","raw_affiliation_strings":["Universitt der Bundeswehr Mnchen, Faculty of Computer Science, D-85577 Neubiberg, Germany","Universit\u00e4t der Bundeswehr M\u00fcnchen, Faculty of Computer Science, D-85577 Neubiberg, Germany"],"affiliations":[{"raw_affiliation_string":"Universitt der Bundeswehr Mnchen, Faculty of Computer Science, D-85577 Neubiberg, Germany","institution_ids":["https://openalex.org/I40527276"]},{"raw_affiliation_string":"Universit\u00e4t der Bundeswehr M\u00fcnchen, Faculty of Computer Science, D-85577 Neubiberg, Germany","institution_ids":["https://openalex.org/I40527276"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054818424","display_name":"Mario Golling","orcid":null},"institutions":[{"id":"https://openalex.org/I40527276","display_name":"Universit\u00e4t der Bundeswehr M\u00fcnchen","ror":"https://ror.org/05kkv3f82","country_code":"DE","type":"education","lineage":["https://openalex.org/I1315109972","https://openalex.org/I40527276","https://openalex.org/I4387152969"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Mario Golling","raw_affiliation_strings":["Universitt der Bundeswehr Mnchen, Faculty of Computer Science, D-85577 Neubiberg, Germany","Bundeswehr University Munich"],"affiliations":[{"raw_affiliation_string":"Universitt der Bundeswehr Mnchen, Faculty of Computer Science, D-85577 Neubiberg, Germany","institution_ids":["https://openalex.org/I40527276"]},{"raw_affiliation_string":"Bundeswehr University Munich","institution_ids":["https://openalex.org/I40527276"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078551681","display_name":"Gabi Dreo Rodosek","orcid":"https://orcid.org/0000-0002-8702-8553"},"institutions":[{"id":"https://openalex.org/I40527276","display_name":"Universit\u00e4t der Bundeswehr M\u00fcnchen","ror":"https://ror.org/05kkv3f82","country_code":"DE","type":"education","lineage":["https://openalex.org/I1315109972","https://openalex.org/I40527276","https://openalex.org/I4387152969"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Gabi Dreo Rodosek","raw_affiliation_strings":["Universit\u00e4t der Bundeswehr M\u00fcnchen, Faculty of Computer Science, D-85577 Neubiberg, Germany"],"affiliations":[{"raw_affiliation_string":"Universit\u00e4t der Bundeswehr M\u00fcnchen, Faculty of Computer Science, D-85577 Neubiberg, Germany","institution_ids":["https://openalex.org/I40527276"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5111886592"],"corresponding_institution_ids":["https://openalex.org/I40527276"],"apc_list":null,"apc_paid":null,"fwci":1.0792,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.80729116,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"7","issue":"3","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8194762468338013},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7690072059631348},{"id":"https://openalex.org/keywords/taxonomy","display_name":"Taxonomy (biology)","score":0.5862776637077332},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.5340724587440491},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.5295634865760803},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.49863100051879883},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3389458656311035}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8194762468338013},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7690072059631348},{"id":"https://openalex.org/C58642233","wikidata":"https://www.wikidata.org/wiki/Q8269924","display_name":"Taxonomy (biology)","level":2,"score":0.5862776637077332},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.5340724587440491},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.5295634865760803},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.49863100051879883},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3389458656311035},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5539/cis.v7n3p18","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v7n3p18","pdf_url":"http://www.ccsenet.org/journal/index.php/cis/article/download/35625/21412","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.5539/cis.v7n3p18","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v7n3p18","pdf_url":"http://www.ccsenet.org/journal/index.php/cis/article/download/35625/21412","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5699999928474426}],"awards":[{"id":"https://openalex.org/G3981126665","display_name":null,"funder_award_id":"Seventh Framework Programme","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G6864424335","display_name":null,"funder_award_id":"318488","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G765451370","display_name":null,"funder_award_id":"ICT-318488","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2044072360.pdf","grobid_xml":"https://content.openalex.org/works/W2044072360.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W17136585","https://openalex.org/W1499966149","https://openalex.org/W1542045205","https://openalex.org/W1584514021","https://openalex.org/W2086341257","https://openalex.org/W2104692292","https://openalex.org/W2117667893","https://openalex.org/W2117767383","https://openalex.org/W2148191588","https://openalex.org/W2152288238","https://openalex.org/W2157151973","https://openalex.org/W2158390457","https://openalex.org/W2962789418","https://openalex.org/W4285719527","https://openalex.org/W6629566846","https://openalex.org/W6682705083"],"related_works":["https://openalex.org/W2801622120","https://openalex.org/W2164141394","https://openalex.org/W1967649051","https://openalex.org/W3036524962","https://openalex.org/W4240977217","https://openalex.org/W2508088450","https://openalex.org/W4214750239","https://openalex.org/W2389434635","https://openalex.org/W2279908259","https://openalex.org/W2133389611"],"abstract_inverted_index":{"The":[0,182],"last":[1],"years":[2],"have":[3],"seen":[4],"an":[5,77],"unprecedented":[6],"amount":[7],"of":[8,27,34,42,48,62,89,111,122,134,140,179,185,196,203],"attacks.":[9,199],"Intrusions":[10],"on":[11],"IT-Systems":[12],"are":[13,44,56,73,143,151,163,188,207],"rising":[14],"constantly":[15],"-":[16],"both":[17],"from":[18],"a":[19,24,86,98],"quantitative":[20],"as":[21,23],"well":[22],"qualitative":[25],"point":[26],"view.":[28],"Well-known":[29],"examples":[30,150],"like":[31,68],"the":[32,35,40,63,84,108,112,129,132,176,194],"hack":[33],"Sony":[36],"Playstation":[37],"Network":[38],"or":[39],"compromise":[41],"RSA":[43],"just":[45],"some":[46,201],"samples":[47],"high-quality":[49],"attack":[50],"vectors.":[51],"Since":[52],"these":[53,103,156],"Smart":[54,90,135,141,180,205],"Attacks":[55,91,142,206],"specifically":[57,174],"designed":[58],"to":[59,75,82,93,96,159,192],"permeate":[60],"state":[61],"art":[64],"technologies,":[65],"current":[66,161],"systems":[67],"Intrusion":[69],"Detection":[70],"Systems":[71],"(IDSs)":[72],"failing":[74],"guarantee":[76],"adequate":[78],"protection.":[79],"In":[80],"order":[81],"improve":[83],"protection,":[85],"comprehensive":[87],"analysis":[88],"needs":[92],"be":[94],"performed":[95],"provide":[97],"basis":[99],"against":[100],"emerging":[101],"threats.Following":[102],"ideas":[104,202],"and":[105,153],"inspired":[106],"by":[107,119],"original":[109],"definition":[110],"term":[113],"Advanced":[114],"Persistent":[115],"Threat":[116],"(APT)":[117],"given":[118],"U.S.":[120],"Department":[121],"Defense,":[123],"this":[124],"publication":[125],"starts":[126],"with":[127],"defining":[128],"terms,":[130],"primarily":[131],"group":[133],"Attacks.":[136,181],"Thereafter,":[137],"individual":[138,167],"facets":[139],"presented":[144,164],"in":[145],"more":[146],"detail,":[147],"before":[148],"recent":[149],"illustrated":[152],"classified":[154],"using":[155],"dimensions.":[157],"Next":[158],"this,":[160],"taxonomies":[162],"including":[165],"their":[166],"shortcomings.":[168],"Our":[169],"revised":[170],"taxonomy":[171,187],"is":[172],"introduced,":[173],"addressing":[175,204],"latest":[177],"generation":[178],"different":[183],"classes":[184],"our":[186],"discussed,":[189],"showing":[190],"how":[191],"address":[193],"specifics":[195],"sophisticated,":[197],"modern":[198],"Finally,":[200],"presented.":[208]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":3}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
