ResearchSpace

Mapping the most significant computer hacking events to a temporal computer attack model

Show simple item record

dc.contributor.author Van Heerden, Renier P
dc.contributor.author Pieterse, Heloise
dc.contributor.author Irwin, B
dc.date.accessioned 2012-12-11T09:27:34Z
dc.date.available 2012-12-11T09:27:34Z
dc.date.issued 2012-09
dc.identifier.citation Van Heerden, R, Pieterse, H and Irwin, B. Mapping the most significant computer hacking events to a temporal computer attack model. IFIP's Human Choice and Computers, International Conference 10 (HCC10), ICT Critical Infrastructures and Society, VU University Amsterdam, 27-28 September 2012 en_US
dc.identifier.uri http://link.springer.com/chapter/10.1007/978-3-642-33332-3_21?null
dc.identifier.uri http://hdl.handle.net/10204/6405
dc.description IFIP's Human Choice and Computers, International Conference 10 (HCC10), ICT Critical Infrastructures and Society, VU University Amsterdam, 27-28 September 2012. Published in IFIP Advances in Information and Communication Technology Volume 386, 2012, pp 226-236. en_US
dc.description.abstract This paper presents 8 of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The Attack stage is separated into: Ramp-up, Damage and Residue. This paper demonstrates how our 18 significant hacking events are mapped to the temporal computer attack model. The temporal computer attack model becomes a valuable asset in the protection of critical infrastructure by being able to detect similar attacks earlier. en_US
dc.language.iso en en_US
dc.publisher Springer en_US
dc.relation.ispartofseries Workflow;9927
dc.subject Computer hacking en_US
dc.subject Computer hacking events en_US
dc.subject Computer attacks en_US
dc.subject Computer attack models en_US
dc.subject Ontology en_US
dc.subject Network attack prediction en_US
dc.title Mapping the most significant computer hacking events to a temporal computer attack model en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Van Heerden, R. P., Pieterse, H., & Irwin, B. (2012). Mapping the most significant computer hacking events to a temporal computer attack model. Springer. http://hdl.handle.net/10204/6405 en_ZA
dc.identifier.chicagocitation Van Heerden, Renier P, Heloise Pieterse, and B Irwin. "Mapping the most significant computer hacking events to a temporal computer attack model." (2012): http://hdl.handle.net/10204/6405 en_ZA
dc.identifier.vancouvercitation Van Heerden RP, Pieterse H, Irwin B, Mapping the most significant computer hacking events to a temporal computer attack model; Springer; 2012. http://hdl.handle.net/10204/6405 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Van Heerden, Renier P AU - Pieterse, Heloise AU - Irwin, B AB - This paper presents 8 of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The Attack stage is separated into: Ramp-up, Damage and Residue. This paper demonstrates how our 18 significant hacking events are mapped to the temporal computer attack model. The temporal computer attack model becomes a valuable asset in the protection of critical infrastructure by being able to detect similar attacks earlier. DA - 2012-09 DB - ResearchSpace DP - CSIR KW - Computer hacking KW - Computer hacking events KW - Computer attacks KW - Computer attack models KW - Ontology KW - Network attack prediction LK - https://researchspace.csir.co.za PY - 2012 T1 - Mapping the most significant computer hacking events to a temporal computer attack model TI - Mapping the most significant computer hacking events to a temporal computer attack model UR - http://hdl.handle.net/10204/6405 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record