GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Show simple item record

dc.contributor.author Burke, I
dc.contributor.author Van Heerden, RP
dc.date.accessioned 2016-12-08T07:42:09Z
dc.date.available 2016-12-08T07:42:09Z
dc.date.issued 2016-03
dc.identifier.citation Burke, I. and Van Heerden, R.P. 2016. Automating cyber offensive operations for cyber challenges. In: 11th International Conference on Cyber Warfare and Security: ICCWS2016, March 2016, Boston, USA en_US
dc.identifier.isbn 978-1-910810-82-8
dc.identifier.uri http://search.proquest.com/openview/16016445fbacbcbcc010821e7feb268d/1?pq-origsite=gscholar&cbl=396500
dc.identifier.uri http://hdl.handle.net/10204/8884
dc.description 11th International Conference on Cyber Warfare and Security: ICCWS2016, March 2016, Boston, USA en_US
dc.description.abstract Cyber awareness training has become a growing industry, with more and more organisations starting to focus on training personnel on how to behave in a secure manner when engaging in cyber operations. Cyber challenges place participants in realistic cyber defence scenarios in order to provide training under fire. This paper documents steps taken to develop an automated attack capability for use within a cyber challenge environment. The challenges discussed within this paper focuses on cyber challenges conducted within developing countries, such as South Africa, but the principles discussed within this paper aim to be applicable to be applicable to all cyber challenges in general. The researchers based their work on prior publications covering threat modelling, construction of cyber security testbeds and planning of offensive cyber operations. The work presented in this paper is a practical application of an ontological model for cyber attack scenarios. en_US
dc.language.iso en en_US
dc.publisher Academic Conferences International Limited en_US
dc.relation.ispartofseries Wokflow;17488
dc.subject Cyber challenges en_US
dc.subject Ontologies en_US
dc.subject Attack automation en_US
dc.title Automating cyber offensive operations for cyber challenges en_US
dc.type Presentation en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search ResearchSpace


Advanced Search

Browse

My Account