ResearchSpace

Automating cyber offensive operations for cyber challenges

Show simple item record

dc.contributor.author Burke, Ivan D
dc.contributor.author Van Heerden, Renier P
dc.date.accessioned 2016-12-08T07:42:09Z
dc.date.available 2016-12-08T07:42:09Z
dc.date.issued 2016-03
dc.identifier.citation Burke, I. and Van Heerden, R.P. 2016. Automating cyber offensive operations for cyber challenges. In: 11th International Conference on Cyber Warfare and Security: ICCWS2016, March 2016, Boston, USA en_US
dc.identifier.isbn 978-1-910810-82-8
dc.identifier.uri http://search.proquest.com/openview/16016445fbacbcbcc010821e7feb268d/1?pq-origsite=gscholar&cbl=396500
dc.identifier.uri http://hdl.handle.net/10204/8884
dc.description 11th International Conference on Cyber Warfare and Security: ICCWS2016, March 2016, Boston, USA en_US
dc.description.abstract Cyber awareness training has become a growing industry, with more and more organisations starting to focus on training personnel on how to behave in a secure manner when engaging in cyber operations. Cyber challenges place participants in realistic cyber defence scenarios in order to provide training under fire. This paper documents steps taken to develop an automated attack capability for use within a cyber challenge environment. The challenges discussed within this paper focuses on cyber challenges conducted within developing countries, such as South Africa, but the principles discussed within this paper aim to be applicable to be applicable to all cyber challenges in general. The researchers based their work on prior publications covering threat modelling, construction of cyber security testbeds and planning of offensive cyber operations. The work presented in this paper is a practical application of an ontological model for cyber attack scenarios. en_US
dc.language.iso en en_US
dc.publisher Academic Conferences International Limited en_US
dc.relation.ispartofseries Wokflow;17488
dc.subject Cyber challenges en_US
dc.subject Ontologies en_US
dc.subject Attack automation en_US
dc.title Automating cyber offensive operations for cyber challenges en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Burke, I. D., & Van Heerden, R. P. (2016). Automating cyber offensive operations for cyber challenges. Academic Conferences International Limited. http://hdl.handle.net/10204/8884 en_ZA
dc.identifier.chicagocitation Burke, Ivan D, and Renier P Van Heerden. "Automating cyber offensive operations for cyber challenges." (2016): http://hdl.handle.net/10204/8884 en_ZA
dc.identifier.vancouvercitation Burke ID, Van Heerden RP, Automating cyber offensive operations for cyber challenges; Academic Conferences International Limited; 2016. http://hdl.handle.net/10204/8884 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Burke, Ivan D AU - Van Heerden, Renier P AB - Cyber awareness training has become a growing industry, with more and more organisations starting to focus on training personnel on how to behave in a secure manner when engaging in cyber operations. Cyber challenges place participants in realistic cyber defence scenarios in order to provide training under fire. This paper documents steps taken to develop an automated attack capability for use within a cyber challenge environment. The challenges discussed within this paper focuses on cyber challenges conducted within developing countries, such as South Africa, but the principles discussed within this paper aim to be applicable to be applicable to all cyber challenges in general. The researchers based their work on prior publications covering threat modelling, construction of cyber security testbeds and planning of offensive cyber operations. The work presented in this paper is a practical application of an ontological model for cyber attack scenarios. DA - 2016-03 DB - ResearchSpace DP - CSIR KW - Cyber challenges KW - Ontologies KW - Attack automation LK - https://researchspace.csir.co.za PY - 2016 SM - 978-1-910810-82-8 T1 - Automating cyber offensive operations for cyber challenges TI - Automating cyber offensive operations for cyber challenges UR - http://hdl.handle.net/10204/8884 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record