ResearchSpace

Classifying network attack scenarios using an ontology

Show simple item record

dc.contributor.author Van Heerden, Renier P
dc.contributor.author Irwin, B
dc.contributor.author Burke, Ivan D
dc.date.accessioned 2012-11-29T13:20:20Z
dc.date.available 2012-11-29T13:20:20Z
dc.date.issued 2012-03
dc.identifier.citation Van Heerden, RP, Irwin, B and Burke, ID. Classifying network attack scenarios using an ontology. Proceedings of the 7th International Conference on Information Warfare and Security, University of Washington, Seattle, 22-23 March 2012, pp 311-324 en_US
dc.identifier.isbn 978-1-908272-30-0
dc.identifier.isbn 978-1-908272-29-4
dc.identifier.uri http://hdl.handle.net/10204/6388
dc.description Proceedings of the 7th International Conference on Information Warfare and Security, University of Washington, Seattle, 22-23 March 2012 en_US
dc.description.abstract This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The Attack stage is separated into: Ramp-up, Damage and Residue. This paper demonstrates how our 18 significant hacking events are mapped to the temporal computer attack model. The temporal computer attack model becomes a valuable asset in the protection of critical infrastructure by being able to detect similar attacks earlier. en_US
dc.language.iso en en_US
dc.publisher Academic Conferences Limited en_US
dc.relation.ispartofseries Workflow;9923
dc.subject Network attacks en_US
dc.subject Information warfare en_US
dc.subject Information security en_US
dc.subject Ontology en_US
dc.subject Taxonomy en_US
dc.title Classifying network attack scenarios using an ontology en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Van Heerden, R. P., Irwin, B., & Burke, I. D. (2012). Classifying network attack scenarios using an ontology. Academic Conferences Limited. http://hdl.handle.net/10204/6388 en_ZA
dc.identifier.chicagocitation Van Heerden, Renier P, B Irwin, and Ivan D Burke. "Classifying network attack scenarios using an ontology." (2012): http://hdl.handle.net/10204/6388 en_ZA
dc.identifier.vancouvercitation Van Heerden RP, Irwin B, Burke ID, Classifying network attack scenarios using an ontology; Academic Conferences Limited; 2012. http://hdl.handle.net/10204/6388 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Van Heerden, Renier P AU - Irwin, B AU - Burke, Ivan D AB - This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The Attack stage is separated into: Ramp-up, Damage and Residue. This paper demonstrates how our 18 significant hacking events are mapped to the temporal computer attack model. The temporal computer attack model becomes a valuable asset in the protection of critical infrastructure by being able to detect similar attacks earlier. DA - 2012-03 DB - ResearchSpace DP - CSIR KW - Network attacks KW - Information warfare KW - Information security KW - Ontology KW - Taxonomy LK - https://researchspace.csir.co.za PY - 2012 SM - 978-1-908272-30-0 SM - 978-1-908272-29-4 T1 - Classifying network attack scenarios using an ontology TI - Classifying network attack scenarios using an ontology UR - http://hdl.handle.net/10204/6388 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record