ResearchSpace

Automated classification of computer network attacks

Show simple item record

dc.contributor.author Van Heerden, Renier P
dc.contributor.author Leenen, L
dc.contributor.author Irwin, B
dc.date.accessioned 2014-02-13T08:43:08Z
dc.date.available 2014-02-13T08:43:08Z
dc.date.issued 2013-11
dc.identifier.citation Van Heerden, R, Leenen, L and Irwin, B. 2013. Automated classification of computer network attacks. In: 5th Workshop on ICT Uses in Warfare and the Safeguarding of Peace (IWSP'13), 25-27 November 2013 en_US
dc.identifier.uri http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=06707510
dc.identifier.uri http://hdl.handle.net/10204/7186
dc.description 5th Workshop on ICT Uses in Warfare and the Safeguarding of Peace (IWSP'13), 25-27 November 2013. Published in IEEE Explore. en_US
dc.description.abstract In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes and inter-class relationships and has previously been implemented in the Protege ontology editor. Two significant recent instances of network based attacks are presented as individuals in the ontology and correctly classified by the automated reasoner according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank in 2012. en_US
dc.language.iso en en_US
dc.publisher IEEE Xplore en_US
dc.relation.ispartofseries Workflow;11640
dc.subject Computer network attacks en_US
dc.subject Warfare en_US
dc.subject Peace safeguarding en_US
dc.subject HermiT en_US
dc.title Automated classification of computer network attacks en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Van Heerden, R. P., Leenen, L., & Irwin, B. (2013). Automated classification of computer network attacks. IEEE Xplore. http://hdl.handle.net/10204/7186 en_ZA
dc.identifier.chicagocitation Van Heerden, Renier P, L Leenen, and B Irwin. "Automated classification of computer network attacks." (2013): http://hdl.handle.net/10204/7186 en_ZA
dc.identifier.vancouvercitation Van Heerden RP, Leenen L, Irwin B, Automated classification of computer network attacks; IEEE Xplore; 2013. http://hdl.handle.net/10204/7186 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Van Heerden, Renier P AU - Leenen, L AU - Irwin, B AB - In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes and inter-class relationships and has previously been implemented in the Protege ontology editor. Two significant recent instances of network based attacks are presented as individuals in the ontology and correctly classified by the automated reasoner according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank in 2012. DA - 2013-11 DB - ResearchSpace DP - CSIR KW - Computer network attacks KW - Warfare KW - Peace safeguarding KW - HermiT LK - https://researchspace.csir.co.za PY - 2013 T1 - Automated classification of computer network attacks TI - Automated classification of computer network attacks UR - http://hdl.handle.net/10204/7186 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record