Modeling Web Security Analysis Attacks with CySeMoL Tool

The utilize of the web has made humans and companies powerless to exterior assaults. Indeed, cyber problems essentially influence information frameworks with distinctive types of malicious attacks such as spyware, virus, social engineering, etc. The Internet e-mail service, in particular, has become...

Full description

Bibliographic Details
Main Authors: Abbas A. Abdulhameed, Razi J. Al-Azawi, Basil M. Al-Mahdawi
Format: Article
Language:Arabic
Published: Al-Mustansiriyah University 2020-08-01
Series:Mustansiriyah Journal of Science
Subjects:
Online Access:http://mjs.uomustansiriyah.edu.iq/ojs1/index.php/MJS/article/view/876
_version_ 1811327965855744000
author Abbas A. Abdulhameed
Razi J. Al-Azawi
Basil M. Al-Mahdawi
author_facet Abbas A. Abdulhameed
Razi J. Al-Azawi
Basil M. Al-Mahdawi
author_sort Abbas A. Abdulhameed
collection DOAJ
description The utilize of the web has made humans and companies powerless to exterior assaults. Indeed, cyber problems essentially influence information frameworks with distinctive types of malicious attacks such as spyware, virus, social engineering, etc. The Internet e-mail service, in particular, has become one of the most dependable methods of communication among people, institutions, and companies. The development of digital signatures to e-mail services has raised the e-mail security, which led to replacing the standard mailing of registered letters. Unfortunately, the process of sending and receiving e-mails has created a negative impact means on security and privacy from cybercriminals by diffusing spam and malware. As a result, e-mail hosts are constantly under attack by malicious programs that are often attached to e-mails. In this paper, the simulation model and prototype of an email traffic monitor developed and tested in order to prove the ability of our proposed method for detecting new viruses. This paper states the success possibility of this new method based on the simulation results. The results of the analysis suggest that the Cyber Security Modeling Language (CySeMoL) model has a good performance of operating system vulnerability prediction. At last, some useful suggestions in the context of the CySeMoL model are presented.
first_indexed 2024-04-13T15:17:14Z
format Article
id doaj.art-d399ed3907b440e39a4c059bbef34a11
institution Directory Open Access Journal
issn 1814-635X
2521-3520
language Arabic
last_indexed 2024-04-13T15:17:14Z
publishDate 2020-08-01
publisher Al-Mustansiriyah University
record_format Article
series Mustansiriyah Journal of Science
spelling doaj.art-d399ed3907b440e39a4c059bbef34a112022-12-22T02:41:49ZaraAl-Mustansiriyah UniversityMustansiriyah Journal of Science1814-635X2521-35202020-08-0131310110910.23851/mjs.v31i3.876338Modeling Web Security Analysis Attacks with CySeMoL ToolAbbas A. Abdulhameed0Razi J. Al-Azawi1Basil M. Al-Mahdawi2Department of Computer Science Mustansiriyah UniversityDepartment of laser and Optoelectronics Engineering, University of technologyDepartment of Mechatronics, Engineering Middle Technical University.The utilize of the web has made humans and companies powerless to exterior assaults. Indeed, cyber problems essentially influence information frameworks with distinctive types of malicious attacks such as spyware, virus, social engineering, etc. The Internet e-mail service, in particular, has become one of the most dependable methods of communication among people, institutions, and companies. The development of digital signatures to e-mail services has raised the e-mail security, which led to replacing the standard mailing of registered letters. Unfortunately, the process of sending and receiving e-mails has created a negative impact means on security and privacy from cybercriminals by diffusing spam and malware. As a result, e-mail hosts are constantly under attack by malicious programs that are often attached to e-mails. In this paper, the simulation model and prototype of an email traffic monitor developed and tested in order to prove the ability of our proposed method for detecting new viruses. This paper states the success possibility of this new method based on the simulation results. The results of the analysis suggest that the Cyber Security Modeling Language (CySeMoL) model has a good performance of operating system vulnerability prediction. At last, some useful suggestions in the context of the CySeMoL model are presented.http://mjs.uomustansiriyah.edu.iq/ojs1/index.php/MJS/article/view/876virus detection, cysemol, traffic monitor, web security, simulations, cybersecurity.
spellingShingle Abbas A. Abdulhameed
Razi J. Al-Azawi
Basil M. Al-Mahdawi
Modeling Web Security Analysis Attacks with CySeMoL Tool
Mustansiriyah Journal of Science
virus detection, cysemol, traffic monitor, web security, simulations, cybersecurity.
title Modeling Web Security Analysis Attacks with CySeMoL Tool
title_full Modeling Web Security Analysis Attacks with CySeMoL Tool
title_fullStr Modeling Web Security Analysis Attacks with CySeMoL Tool
title_full_unstemmed Modeling Web Security Analysis Attacks with CySeMoL Tool
title_short Modeling Web Security Analysis Attacks with CySeMoL Tool
title_sort modeling web security analysis attacks with cysemol tool
topic virus detection, cysemol, traffic monitor, web security, simulations, cybersecurity.
url http://mjs.uomustansiriyah.edu.iq/ojs1/index.php/MJS/article/view/876
work_keys_str_mv AT abbasaabdulhameed modelingwebsecurityanalysisattackswithcysemoltool
AT razijalazawi modelingwebsecurityanalysisattackswithcysemoltool
AT basilmalmahdawi modelingwebsecurityanalysisattackswithcysemoltool