Author:Van Heerden, Renier P; Leenen, L; Irwin, BDate:Nov 2013In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through ...Read more
Author:Van Heerden, Renier P; Irwin, B; Burke, Ivan D; Leenen, LDate:2012Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has the consequence that no standard classification exists. The benefit of automated classification ...Read more
Author:Van Heerden, Renier P; Pieterse, Heloise; Burke, Ivan D; Irwin, BDate:Nov 2013Computer network attacks are difficult to simulate due to the damage they may cause to live networks and the complexity required simulating a useful network. We constructed a virtualised network within a vSphere ESXi environment which is able ...Read more