Van Heerden, Renier PIrwin, BBurke, Ivan D2012-11-292012-11-292012-03Van Heerden, RP, Irwin, B and Burke, ID. Classifying network attack scenarios using an ontology. Proceedings of the 7th International Conference on Information Warfare and Security, University of Washington, Seattle, 22-23 March 2012, pp 311-324978-1-908272-30-0978-1-908272-29-4http://hdl.handle.net/10204/6388Proceedings of the 7th International Conference on Information Warfare and Security, University of Washington, Seattle, 22-23 March 2012This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The Attack stage is separated into: Ramp-up, Damage and Residue. This paper demonstrates how our 18 significant hacking events are mapped to the temporal computer attack model. The temporal computer attack model becomes a valuable asset in the protection of critical infrastructure by being able to detect similar attacks earlier.enNetwork attacksInformation warfareInformation securityOntologyTaxonomyClassifying network attack scenarios using an ontologyConference PresentationVan Heerden, R. P., Irwin, B., & Burke, I. D. (2012). Classifying network attack scenarios using an ontology. Academic Conferences Limited. http://hdl.handle.net/10204/6388Van Heerden, Renier P, B Irwin, and Ivan D Burke. "Classifying network attack scenarios using an ontology." (2012): http://hdl.handle.net/10204/6388Van Heerden RP, Irwin B, Burke ID, Classifying network attack scenarios using an ontology; Academic Conferences Limited; 2012. http://hdl.handle.net/10204/6388 .TY - Conference Presentation AU - Van Heerden, Renier P AU - Irwin, B AU - Burke, Ivan D AB - This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The Attack stage is separated into: Ramp-up, Damage and Residue. This paper demonstrates how our 18 significant hacking events are mapped to the temporal computer attack model. The temporal computer attack model becomes a valuable asset in the protection of critical infrastructure by being able to detect similar attacks earlier. DA - 2012-03 DB - ResearchSpace DP - CSIR KW - Network attacks KW - Information warfare KW - Information security KW - Ontology KW - Taxonomy LK - https://researchspace.csir.co.za PY - 2012 SM - 978-1-908272-30-0 SM - 978-1-908272-29-4 T1 - Classifying network attack scenarios using an ontology TI - Classifying network attack scenarios using an ontology UR - http://hdl.handle.net/10204/6388 ER -