Chan, Ka Fai PTheron, JVan Heerden, Renier PLeenen, L2015-11-122015-11-122015-03Chan, P, Theron, J, Van Heerden, R and Louise, L. 2015. An ontological knowledge base for cyber network attack planning. In: Proceedings of the 10th International Conference on Cyber Warfare and Security, Kruger National Park, South Africa, 24-25 March 2015, pp 69-77.http://hdl.handle.net/10204/8267https://www.researchgate.net/publication/283703637_An_Ontological_Knowledge_Base_for_Cyber_Network_Attack_Planninghttps://www.researchgate.net/publication/305416928_Using_an_Ontology_for_Network_Attack_PlanningAbstract Only.In modern warfare it is no longer sufficient to only focus on physical attacks and counter-measures; the threat against cyber networks is becoming increasingly significant. Modern military forces have to provide counter measures against these growing threats in the cyberspace. These forces thus find themselves in the position where they need the capability to perform cyber operations. This paper presents a Network Attack Planning ontology which is aimed at providing support for military cyber operations. The cyber network operation domain is growing at a rapid rate and involves an ever increasing volume of associated information. Semantic technologies can contribute towards the intelligent processing of information in this complex problem area. An ontology enables the representation of semantic information and automated reasoning that can support the complexity of planning cyber operations. It also contributes towards the sharing of information and the creation and maintenance of a common vocabulary. The inferences that can be made with the automated reasoning capabilities of ontologies provide a unique insight into the relationships between network targets and attacks that could be launched against them.enOntologiesNetwork attack planningCyber warfareCommand and controlAn ontological knowledge base for cyber network attack planningConference PresentationChan, K. F. P., Theron, J., Van Heerden, R. P., & Leenen, L. (2015). An ontological knowledge base for cyber network attack planning. http://hdl.handle.net/10204/8267Chan, Ka Fai P, J Theron, Renier P Van Heerden, and L Leenen. "An ontological knowledge base for cyber network attack planning." (2015): http://hdl.handle.net/10204/8267Chan KFP, Theron J, Van Heerden RP, Leenen L, An ontological knowledge base for cyber network attack planning; 2015. http://hdl.handle.net/10204/8267 .TY - Conference Presentation AU - Chan, Ka Fai P AU - Theron, J AU - Van Heerden, Renier P AU - Leenen, L AB - In modern warfare it is no longer sufficient to only focus on physical attacks and counter-measures; the threat against cyber networks is becoming increasingly significant. Modern military forces have to provide counter measures against these growing threats in the cyberspace. These forces thus find themselves in the position where they need the capability to perform cyber operations. This paper presents a Network Attack Planning ontology which is aimed at providing support for military cyber operations. The cyber network operation domain is growing at a rapid rate and involves an ever increasing volume of associated information. Semantic technologies can contribute towards the intelligent processing of information in this complex problem area. An ontology enables the representation of semantic information and automated reasoning that can support the complexity of planning cyber operations. It also contributes towards the sharing of information and the creation and maintenance of a common vocabulary. The inferences that can be made with the automated reasoning capabilities of ontologies provide a unique insight into the relationships between network targets and attacks that could be launched against them. DA - 2015-03 DB - ResearchSpace DP - CSIR KW - Ontologies KW - Network attack planning KW - Cyber warfare KW - Command and control LK - https://researchspace.csir.co.za PY - 2015 T1 - An ontological knowledge base for cyber network attack planning TI - An ontological knowledge base for cyber network attack planning UR - http://hdl.handle.net/10204/8267 ER -