DSpace
 

Researchspace >
General science, engineering & technology >
General science, engineering & technology >
General science, engineering & technology >

Please use this identifier to cite or link to this item: http://hdl.handle.net/10204/6405

Title: Mapping the most significant computer hacking events to a temporal computer attack model
Authors: Van Heerden, R
Pieterse, H
Irwin, B
Keywords: Computer hacking
Computer hacking events
Computer attacks
Computer attack models
Ontology
Network attack prediction
Issue Date: Sep-2012
Publisher: Springer
Citation: Van Heerden, R, Pieterse, H and Irwin, B. Mapping the most significant computer hacking events to a temporal computer attack model. IFIP's Human Choice and Computers, International Conference 10 (HCC10), ICT Critical Infrastructures and Society, VU University Amsterdam, 27-28 September 2012
Series/Report no.: Workflow;9927
Abstract: This paper presents 8 of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The Attack stage is separated into: Ramp-up, Damage and Residue. This paper demonstrates how our 18 significant hacking events are mapped to the temporal computer attack model. The temporal computer attack model becomes a valuable asset in the protection of critical infrastructure by being able to detect similar attacks earlier.
Description: IFIP's Human Choice and Computers, International Conference 10 (HCC10), ICT Critical Infrastructures and Society, VU University Amsterdam, 27-28 September 2012. Published in IFIP Advances in Information and Communication Technology Volume 386, 2012, pp 226-236.
URI: http://link.springer.com/chapter/10.1007/978-3-642-33332-3_21?null
http://hdl.handle.net/10204/6405
Appears in Collections:Command control and information warfare
General science, engineering & technology

Files in This Item:

File Description SizeFormat
Van Heerden3_2012.pdf324.41 kBAdobe PDFView/Open
View Statistics

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

 

Valid XHTML 1.0! DSpace Software Copyright © 2002-2010  Duraspace - Feedback