JIGSAW Attack Modeling Language

8/20/99


Click here to start


Table of Contents

JIGSAW Attack Modeling Language

JIGSAW Origins

Concept Structure

Concept Framework

requires - events needed

requires - (continued)

report - changes in KB

report - (continued)

report - (continued)

report - (continued)

where - Correlates assertions

Example: SynFlood

More Examples

Example: Connection Spoofing

action - external effects

extends - basic inheritance

Sensor Framework

Concept Hierarchy

Concept Hierarchy

Concept Hierarchy

Concept Hierarchy

Concept Hierarchy?

Concept Hierarchy

Report Specialization

D.O.S. - Hierarchy of Specialization

Conceptual Execution Model

Uses

Attack Requirements

Challenges

Summary

Author: John Smith

Home Page: http://seclab.cs.ucdavis.edu/global-guard/