Van Heerden, Renier PIrwin, BBurke, Ivan DLeenen, L2014-02-132014-02-132012Van Heerden, R.P, Irwin, B, Burke, I.D and Leenen, L. 2012. A computer network attack taxonomy and ontology. vol. 2(3), pp 12-251947-3435http://www.igi-global.com/article/a-computer-network-attack-taxonomy-and-ontology/86073http://hdl.handle.net/10204/7217Copyright: 2012 IGI Global. This is an pre/post print version of the work. The definitive version is published in International Journal of Cyber Warfare and Terrorism, vol. 2(3), pp 12-25Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has the consequence that no standard classification exists. The benefit of automated classification of attacks, means that an attack could be mitigated accordingly. The authors extend a previous, initial taxonomy of computer network attacks which forms the basis of a proposed network attack ontology in this paper. The objective of this ontology is to automate the classification of a network attack during its early stages. Most published taxonomies present an attack from either the attacker's or defender's point of view. The authors’ taxonomy presents both these points of view. The framework for an ontology was developed using a core class, the “Attack Scenario”, which can be used to characterize and classify computer network attacks.enComputer network attacksCyber warfareTerrorismNetwork attack taxonomyNetwork attack ontologyA computer network attack taxonomy and ontologyArticleVan Heerden, R. P., Irwin, B., Burke, I. D., & Leenen, L. (2012). A computer network attack taxonomy and ontology. http://hdl.handle.net/10204/7217Van Heerden, Renier P, B Irwin, Ivan D Burke, and L Leenen "A computer network attack taxonomy and ontology." (2012) http://hdl.handle.net/10204/7217Van Heerden RP, Irwin B, Burke ID, Leenen L. A computer network attack taxonomy and ontology. 2012; http://hdl.handle.net/10204/7217.TY - Article AU - Van Heerden, Renier P AU - Irwin, B AU - Burke, Ivan D AU - Leenen, L AB - Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has the consequence that no standard classification exists. The benefit of automated classification of attacks, means that an attack could be mitigated accordingly. The authors extend a previous, initial taxonomy of computer network attacks which forms the basis of a proposed network attack ontology in this paper. The objective of this ontology is to automate the classification of a network attack during its early stages. Most published taxonomies present an attack from either the attacker's or defender's point of view. The authors’ taxonomy presents both these points of view. The framework for an ontology was developed using a core class, the “Attack Scenario”, which can be used to characterize and classify computer network attacks. DA - 2012 DB - ResearchSpace DP - CSIR KW - Computer network attacks KW - Cyber warfare KW - Terrorism KW - Network attack taxonomy KW - Network attack ontology LK - https://researchspace.csir.co.za PY - 2012 SM - 1947-3435 T1 - A computer network attack taxonomy and ontology TI - A computer network attack taxonomy and ontology UR - http://hdl.handle.net/10204/7217 ER -