-
Notifications
You must be signed in to change notification settings - Fork 176
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How are threats named, e.g., INPXX or AAXX? #207
Comments
If I remember correctly, DO stands for "denial of ...". DO02 is Excessive Allocation, DO03 is XML Ping of Death, and so on. A standard would be a welcome addition, if you have time and ideas! |
Thanks for your comment. Based on the CAPEC website, one can use "Related Attack Patterns" to capture the parent attack and then build the IDs based on that. In this way, it is more meaningful and can be traced back to the main type of threat. I have taken the fields of "related attack pattern" and have looked for the parent of such an attack via following "ChildOf" or "CanPrecede",... Following is the output of main attacks:
and their corresponding acronyms are like:
Each non-main attack is then indexed.
This can be a standard for naming. |
This is a great idea! I don't know if or how people are using the existing naming convention, but perhaps we could add an ALT_SID field using yours and warn people that in the future we would sunset the original names, then move ALT_SID to SID. |
We might consider using MITRE ATT&CK Tactics and Techniques as additional threats, so be careful tying the threat IDs to CAPEC structures (although the "main attack types" above seem generic enough to consider). |
I wonder how the acronyms for the threats are made. I can't find a logical relationship between the threat's name and its acronym. Let's take a look at the following example:
DO01 - Flooding
Is there any specific standard for such acronyms?
The text was updated successfully, but these errors were encountered: