Van Heerden, Renier PPieterse, HeloiseIrwin, B2012-12-112012-12-112012-09Van Heerden, R, Pieterse, H and Irwin, B. Mapping the most significant computer hacking events to a temporal computer attack model. IFIP's Human Choice and Computers, International Conference 10 (HCC10), ICT Critical Infrastructures and Society, VU University Amsterdam, 27-28 September 2012http://link.springer.com/chapter/10.1007/978-3-642-33332-3_21?nullhttp://hdl.handle.net/10204/6405IFIP's Human Choice and Computers, International Conference 10 (HCC10), ICT Critical Infrastructures and Society, VU University Amsterdam, 27-28 September 2012. Published in IFIP Advances in Information and Communication Technology Volume 386, 2012, pp 226-236.This paper presents 8 of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The Attack stage is separated into: Ramp-up, Damage and Residue. This paper demonstrates how our 18 significant hacking events are mapped to the temporal computer attack model. The temporal computer attack model becomes a valuable asset in the protection of critical infrastructure by being able to detect similar attacks earlier.enComputer hackingComputer hacking eventsComputer attacksComputer attack modelsOntologyNetwork attack predictionMapping the most significant computer hacking events to a temporal computer attack modelConference PresentationVan Heerden, R. P., Pieterse, H., & Irwin, B. (2012). Mapping the most significant computer hacking events to a temporal computer attack model. Springer. http://hdl.handle.net/10204/6405Van Heerden, Renier P, Heloise Pieterse, and B Irwin. "Mapping the most significant computer hacking events to a temporal computer attack model." (2012): http://hdl.handle.net/10204/6405Van Heerden RP, Pieterse H, Irwin B, Mapping the most significant computer hacking events to a temporal computer attack model; Springer; 2012. http://hdl.handle.net/10204/6405 .TY - Conference Presentation AU - Van Heerden, Renier P AU - Pieterse, Heloise AU - Irwin, B AB - This paper presents 8 of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The Attack stage is separated into: Ramp-up, Damage and Residue. This paper demonstrates how our 18 significant hacking events are mapped to the temporal computer attack model. The temporal computer attack model becomes a valuable asset in the protection of critical infrastructure by being able to detect similar attacks earlier. DA - 2012-09 DB - ResearchSpace DP - CSIR KW - Computer hacking KW - Computer hacking events KW - Computer attacks KW - Computer attack models KW - Ontology KW - Network attack prediction LK - https://researchspace.csir.co.za PY - 2012 T1 - Mapping the most significant computer hacking events to a temporal computer attack model TI - Mapping the most significant computer hacking events to a temporal computer attack model UR - http://hdl.handle.net/10204/6405 ER -