dc.contributor.author |
Van Heerden, Renier P
|
|
dc.contributor.author |
Leenen, L
|
|
dc.contributor.author |
Irwin, B
|
|
dc.date.accessioned |
2014-02-13T08:43:08Z |
|
dc.date.available |
2014-02-13T08:43:08Z |
|
dc.date.issued |
2013-11 |
|
dc.identifier.citation |
Van Heerden, R, Leenen, L and Irwin, B. 2013. Automated classification of computer network attacks. In: 5th Workshop on ICT Uses in Warfare and the Safeguarding of Peace (IWSP'13), 25-27 November 2013 |
en_US |
dc.identifier.uri |
http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=06707510
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/7186
|
|
dc.description |
5th Workshop on ICT Uses in Warfare and the Safeguarding of Peace (IWSP'13), 25-27 November 2013. Published in IEEE Explore. |
en_US |
dc.description.abstract |
In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes and inter-class relationships and has previously been implemented in the Protege ontology editor. Two significant recent instances of network based attacks are presented as individuals in the ontology and correctly classified by the automated reasoner according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank in 2012. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IEEE Xplore |
en_US |
dc.relation.ispartofseries |
Workflow;11640 |
|
dc.subject |
Computer network attacks |
en_US |
dc.subject |
Warfare |
en_US |
dc.subject |
Peace safeguarding |
en_US |
dc.subject |
HermiT |
en_US |
dc.title |
Automated classification of computer network attacks |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Van Heerden, R. P., Leenen, L., & Irwin, B. (2013). Automated classification of computer network attacks. IEEE Xplore. http://hdl.handle.net/10204/7186 |
en_ZA |
dc.identifier.chicagocitation |
Van Heerden, Renier P, L Leenen, and B Irwin. "Automated classification of computer network attacks." (2013): http://hdl.handle.net/10204/7186 |
en_ZA |
dc.identifier.vancouvercitation |
Van Heerden RP, Leenen L, Irwin B, Automated classification of computer network attacks; IEEE Xplore; 2013. http://hdl.handle.net/10204/7186 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Van Heerden, Renier P
AU - Leenen, L
AU - Irwin, B
AB - In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes and inter-class relationships and has previously been implemented in the Protege ontology editor. Two significant recent instances of network based attacks are presented as individuals in the ontology and correctly classified by the automated reasoner according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank in 2012.
DA - 2013-11
DB - ResearchSpace
DP - CSIR
KW - Computer network attacks
KW - Warfare
KW - Peace safeguarding
KW - HermiT
LK - https://researchspace.csir.co.za
PY - 2013
T1 - Automated classification of computer network attacks
TI - Automated classification of computer network attacks
UR - http://hdl.handle.net/10204/7186
ER -
|
en_ZA |