I don't know what these changes are supposed to accomplish but somebody told me to make them.
This commit is contained in:
@@ -1294,63 +1294,104 @@ migration and rollback attacks). Από την άλλη, όσον αφορά τ
|
|||||||
|
|
||||||
\begin{table}[!ht]
|
\begin{table}[!ht]
|
||||||
\caption{Κατηγοριοποίηση απειλών στην εικονικοποίηση}
|
\caption{Κατηγοριοποίηση απειλών στην εικονικοποίηση}
|
||||||
\renewcommand{\arraystretch}{1.5}
|
\renewcommand{\arraystretch}{1.3}
|
||||||
|
\aboverulesep=-0.1ex
|
||||||
|
\belowrulesep=-0.1ex
|
||||||
\centering
|
\centering
|
||||||
\newcolumntype{C}{>{\centering\arraybackslash}m{6cm}}
|
\newcolumntype{C}{>{\centering\arraybackslash}m{6cm}}
|
||||||
\newcommand\Tstrut{\rule{0pt}{2.6ex}} % = `top' strut
|
|
||||||
\newcommand\Bstrut{\rule[-0.9ex]{0pt}{0pt}} % = `bottom' strut
|
|
||||||
\textgreek{\begin{tabular}{||C|C||}
|
\textgreek{\begin{tabular}{||C|C||}
|
||||||
\hline
|
\hline
|
||||||
|
Κατηγορία & Απειλές και πιθανά ευπαθή σημεία \\ \hline\hline
|
||||||
Κατηγορία & Απειλές και πιθανά ευπαθή σημεία \\ [0.5ex]
|
\multirow{11}{*}{\hfil Απειλές Δικτύου} & XML Signature Wrapping Attacks \\ \cmidrule(lr){2-2}
|
||||||
|
& Flooding Attacks (DDoS) \\ \cmidrule(lr){2-2}
|
||||||
\hline\hline
|
& Metadata Spoofing Attacks \\ \cmidrule(lr){2-2}
|
||||||
|
& Insecure Web Apps \& APIs \\ \cmidrule(lr){2-2}
|
||||||
Απειλές Δικτύου &
|
& Cross Site Scripting Attacks \\ \cmidrule(lr){2-2}
|
||||||
|
& Port scanning \\ \cmidrule(lr){2-2}
|
||||||
XML Signature Wrapping Attacks\Tstrut\Bstrut\hline
|
& Botnets \\ \cmidrule(lr){2-2}
|
||||||
Flooding Attacks (DDoS)\Tstrut\Bstrut\hline
|
& Spoofing attacks \\ \cmidrule(lr){2-2}
|
||||||
Metadata Spoofing Attacks\Tstrut\Bstrut\hline
|
& DNS attacks \\ \cmidrule(lr){2-2}
|
||||||
Insecure Web Apps \& APIs\Tstrut\Bstrut\hline
|
& Sniffer attacks \\ \cmidrule(lr){2-2}
|
||||||
Cross Site Scripting Attacks\Tstrut\Bstrut\hline
|
& Denial of Service (DoS) \\ \hline
|
||||||
Port scanning\Tstrut\Bstrut\hline
|
\multirow{9}{*}{\hfil Απειλές για τον Πάροχο} & Sniffing Attacks \\ \cmidrule(lr){2-2}
|
||||||
Botnets\Tstrut\Bstrut\hline
|
& Spoofing Attacks \\ \cmidrule(lr){2-2}
|
||||||
Spoofing attacks\Tstrut\Bstrut\hline
|
& Denial of Service Attacks \\ \cmidrule(lr){2-2}
|
||||||
DNS attacks\Tstrut\Bstrut\hline
|
& cross VM side channel attacks \\ \cmidrule(lr){2-2}
|
||||||
Sniffer attacks\Tstrut\Bstrut\hline
|
& VM scheduler based attacks \\ \cmidrule(lr){2-2}
|
||||||
Denial of Service (DoS)\Tstrut\Bstrut \\
|
& VM Hopping \\ \cmidrule(lr){2-2}
|
||||||
|
& VM Escape \\ \cmidrule(lr){2-2}
|
||||||
\hline
|
& Dynamic Data Updates \\ \cmidrule(lr){2-2}
|
||||||
|
& Data scavenging \\ \hline
|
||||||
Απειλές για τον Πάροχο &
|
\multirow{6}{*}{\hfil Απειλές για τις Εφαρμογές} & Malware injection \\ \cmidrule(lr){2-2}
|
||||||
|
& Steganography attacks \\ \cmidrule(lr){2-2}
|
||||||
Sniffing Attacks\Tstrut\Bstrut\hline
|
& Web services attacks \\ \cmidrule(lr){2-2}
|
||||||
Spoofing Attacks\Tstrut\Bstrut\hline
|
& Protocol-based attacks \\ \cmidrule(lr){2-2}
|
||||||
Denial of Service Attacks\Tstrut\Bstrut\hline
|
& Security Misconfigurations \\ \cmidrule(lr){2-2}
|
||||||
cross VM side channel attacks\Tstrut\Bstrut\hline
|
& SQL Injection Attacks \\ \hline
|
||||||
VM scheduler based attacks\Tstrut\Bstrut\hline
|
|
||||||
VM Hopping\Tstrut\Bstrut\hline
|
|
||||||
VM Escape\Tstrut\Bstrut\hline
|
|
||||||
Dynamic Data Updates\Tstrut\Bstrut\hline
|
|
||||||
Data scavenging\Tstrut\Bstrut \\
|
|
||||||
|
|
||||||
\hline
|
|
||||||
|
|
||||||
Απειλές για τις Εφαρμογές &
|
|
||||||
|
|
||||||
Malware injection\Tstrut\Bstrut\hline
|
|
||||||
Steganography attacks\Tstrut\Bstrut\hline
|
|
||||||
Web services attacks\Tstrut\Bstrut\hline
|
|
||||||
Protocol-based attacks\Tstrut\Bstrut\hline
|
|
||||||
Security Misconfigurations\Tstrut\Bstrut\hline
|
|
||||||
SQL Injection Attacks\Tstrut\Bstrut \\
|
|
||||||
|
|
||||||
\hline
|
|
||||||
\end{tabular}}
|
\end{tabular}}
|
||||||
\label{table:virtualizationThreatCategories}
|
\label{table:virtualizationThreatCategories}
|
||||||
\renewcommand{\arraystretch}{1}
|
\renewcommand{\arraystretch}{1}
|
||||||
\end{table}
|
\end{table}
|
||||||
|
|
||||||
|
% \begin{table}[!ht]
|
||||||
|
% \caption{Κατηγοριοποίηση απειλών στην εικονικοποίηση}
|
||||||
|
% \renewcommand{\arraystretch}{1.5}
|
||||||
|
% \centering
|
||||||
|
% \newcolumntype{C}{>{\centering\arraybackslash}m{6cm}}
|
||||||
|
% \newcommand\Tstrut{\rule{0pt}{2.6ex}} % = `top' strut
|
||||||
|
% \newcommand\Bstrut{\rule[-0.9ex]{0pt}{0pt}} % = `bottom' strut
|
||||||
|
% \textgreek{\begin{tabular}{||C|C||}
|
||||||
|
% \hline
|
||||||
|
% %
|
||||||
|
% Κατηγορία & Απειλές και πιθανά ευπαθή σημεία \\ [0.5ex]
|
||||||
|
% %
|
||||||
|
% \hline\hline
|
||||||
|
% %
|
||||||
|
% Απειλές Δικτύου &
|
||||||
|
% %
|
||||||
|
% XML Signature Wrapping Attacks\Tstrut\Bstrut\hline
|
||||||
|
% Flooding Attacks (DDoS)\Tstrut\Bstrut\hline
|
||||||
|
% Metadata Spoofing Attacks\Tstrut\Bstrut\hline
|
||||||
|
% Insecure Web Apps \& APIs\Tstrut\Bstrut\hline
|
||||||
|
% Cross Site Scripting Attacks\Tstrut\Bstrut\hline
|
||||||
|
% Port scanning\Tstrut\Bstrut\hline
|
||||||
|
% Botnets\Tstrut\Bstrut\hline
|
||||||
|
% Spoofing attacks\Tstrut\Bstrut\hline
|
||||||
|
% DNS attacks\Tstrut\Bstrut\hline
|
||||||
|
% Sniffer attacks\Tstrut\Bstrut\hline
|
||||||
|
% Denial of Service (DoS)\Tstrut\Bstrut \\
|
||||||
|
% %
|
||||||
|
% \hline
|
||||||
|
% %
|
||||||
|
% Απειλές για τον Πάροχο &
|
||||||
|
% %
|
||||||
|
% Sniffing Attacks\Tstrut\Bstrut\hline
|
||||||
|
% Spoofing Attacks\Tstrut\Bstrut\hline
|
||||||
|
% Denial of Service Attacks\Tstrut\Bstrut\hline
|
||||||
|
% cross VM side channel attacks\Tstrut\Bstrut\hline
|
||||||
|
% VM scheduler based attacks\Tstrut\Bstrut\hline
|
||||||
|
% VM Hopping\Tstrut\Bstrut\hline
|
||||||
|
% VM Escape\Tstrut\Bstrut\hline
|
||||||
|
% Dynamic Data Updates\Tstrut\Bstrut\hline
|
||||||
|
% Data scavenging\Tstrut\Bstrut \\
|
||||||
|
% %
|
||||||
|
% \hline
|
||||||
|
% %
|
||||||
|
% Απειλές για τις Εφαρμογές &
|
||||||
|
% %
|
||||||
|
% Malware injection\Tstrut\Bstrut\hline
|
||||||
|
% Steganography attacks\Tstrut\Bstrut\hline
|
||||||
|
% Web services attacks\Tstrut\Bstrut\hline
|
||||||
|
% Protocol-based attacks\Tstrut\Bstrut\hline
|
||||||
|
% Security Misconfigurations\Tstrut\Bstrut\hline
|
||||||
|
% SQL Injection Attacks\Tstrut\Bstrut \\
|
||||||
|
% %
|
||||||
|
% \hline
|
||||||
|
% \end{tabular}}
|
||||||
|
% \label{table:virtualizationThreatCategories}
|
||||||
|
% \renewcommand{\arraystretch}{1}
|
||||||
|
% \end{table}
|
||||||
|
|
||||||
\clearpage
|
\clearpage
|
||||||
|
|
||||||
Κατηγοριοποίηση με μεγαλύτερη λεπτομέρεια ως προς τις κατηγορίες αδυναμιών όπου
|
Κατηγοριοποίηση με μεγαλύτερη λεπτομέρεια ως προς τις κατηγορίες αδυναμιών όπου
|
||||||
|
|||||||
Reference in New Issue
Block a user