Modeling Web Security Analysis Attacks with CySeMoL Tool
The utilize of the web has made humans and companies powerless to exterior assaults. Indeed, cyber problems essentially influence information frameworks with distinctive types of malicious attacks such as spyware, virus, social engineering, etc. The Internet e-mail service, in particular, has become...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | Arabic |
Published: |
Al-Mustansiriyah University
2020-08-01
|
Series: | Mustansiriyah Journal of Science |
Subjects: | |
Online Access: | http://mjs.uomustansiriyah.edu.iq/ojs1/index.php/MJS/article/view/876 |
_version_ | 1811327965855744000 |
---|---|
author | Abbas A. Abdulhameed Razi J. Al-Azawi Basil M. Al-Mahdawi |
author_facet | Abbas A. Abdulhameed Razi J. Al-Azawi Basil M. Al-Mahdawi |
author_sort | Abbas A. Abdulhameed |
collection | DOAJ |
description | The utilize of the web has made humans and companies powerless to exterior assaults. Indeed, cyber problems essentially influence information frameworks with distinctive types of malicious attacks such as spyware, virus, social engineering, etc. The Internet e-mail service, in particular, has become one of the most dependable methods of communication among people, institutions, and companies. The development of digital signatures to e-mail services has raised the e-mail security, which led to replacing the standard mailing of registered letters. Unfortunately, the process of sending and receiving e-mails has created a negative impact means on security and privacy from cybercriminals by diffusing spam and malware. As a result, e-mail hosts are constantly under attack by malicious programs that are often attached to e-mails. In this paper, the simulation model and prototype of an email traffic monitor developed and tested in order to prove the ability of our proposed method for detecting new viruses. This paper states the success possibility of this new method based on the simulation results. The results of the analysis suggest that the Cyber Security Modeling Language (CySeMoL) model has a good performance of operating system vulnerability prediction. At last, some useful suggestions in the context of the CySeMoL model are presented. |
first_indexed | 2024-04-13T15:17:14Z |
format | Article |
id | doaj.art-d399ed3907b440e39a4c059bbef34a11 |
institution | Directory Open Access Journal |
issn | 1814-635X 2521-3520 |
language | Arabic |
last_indexed | 2024-04-13T15:17:14Z |
publishDate | 2020-08-01 |
publisher | Al-Mustansiriyah University |
record_format | Article |
series | Mustansiriyah Journal of Science |
spelling | doaj.art-d399ed3907b440e39a4c059bbef34a112022-12-22T02:41:49ZaraAl-Mustansiriyah UniversityMustansiriyah Journal of Science1814-635X2521-35202020-08-0131310110910.23851/mjs.v31i3.876338Modeling Web Security Analysis Attacks with CySeMoL ToolAbbas A. Abdulhameed0Razi J. Al-Azawi1Basil M. Al-Mahdawi2Department of Computer Science Mustansiriyah UniversityDepartment of laser and Optoelectronics Engineering, University of technologyDepartment of Mechatronics, Engineering Middle Technical University.The utilize of the web has made humans and companies powerless to exterior assaults. Indeed, cyber problems essentially influence information frameworks with distinctive types of malicious attacks such as spyware, virus, social engineering, etc. The Internet e-mail service, in particular, has become one of the most dependable methods of communication among people, institutions, and companies. The development of digital signatures to e-mail services has raised the e-mail security, which led to replacing the standard mailing of registered letters. Unfortunately, the process of sending and receiving e-mails has created a negative impact means on security and privacy from cybercriminals by diffusing spam and malware. As a result, e-mail hosts are constantly under attack by malicious programs that are often attached to e-mails. In this paper, the simulation model and prototype of an email traffic monitor developed and tested in order to prove the ability of our proposed method for detecting new viruses. This paper states the success possibility of this new method based on the simulation results. The results of the analysis suggest that the Cyber Security Modeling Language (CySeMoL) model has a good performance of operating system vulnerability prediction. At last, some useful suggestions in the context of the CySeMoL model are presented.http://mjs.uomustansiriyah.edu.iq/ojs1/index.php/MJS/article/view/876virus detection, cysemol, traffic monitor, web security, simulations, cybersecurity. |
spellingShingle | Abbas A. Abdulhameed Razi J. Al-Azawi Basil M. Al-Mahdawi Modeling Web Security Analysis Attacks with CySeMoL Tool Mustansiriyah Journal of Science virus detection, cysemol, traffic monitor, web security, simulations, cybersecurity. |
title | Modeling Web Security Analysis Attacks with CySeMoL Tool |
title_full | Modeling Web Security Analysis Attacks with CySeMoL Tool |
title_fullStr | Modeling Web Security Analysis Attacks with CySeMoL Tool |
title_full_unstemmed | Modeling Web Security Analysis Attacks with CySeMoL Tool |
title_short | Modeling Web Security Analysis Attacks with CySeMoL Tool |
title_sort | modeling web security analysis attacks with cysemol tool |
topic | virus detection, cysemol, traffic monitor, web security, simulations, cybersecurity. |
url | http://mjs.uomustansiriyah.edu.iq/ojs1/index.php/MJS/article/view/876 |
work_keys_str_mv | AT abbasaabdulhameed modelingwebsecurityanalysisattackswithcysemoltool AT razijalazawi modelingwebsecurityanalysisattackswithcysemoltool AT basilmalmahdawi modelingwebsecurityanalysisattackswithcysemoltool |