Grant, TBurke, Ivan DVan Heerden, Renier P2013-03-252013-03-252012-03Grant, T, Burke, I and Van Heerden, R. 2012. Comparing models of offensive cyber operations. In: 7th International Conference on Information Warfare and Security, University of Washington, Seattle, USA, 22-23 March 2012http://connection.ebscohost.com/c/articles/74572640/comparing-models-offensive-cyber-operationshttp://hdl.handle.net/10204/66197th International Conference on Information Warfare and Security, University of Washington, Seattle, USA, 22-23 March 2012The purpose of this paper is to find, formalise, and compare models of the offensive cyber operations process available in the open scientific literature. Seven models were sufficiently well described for formalisation using Structured Analysis and Design Technique (SADT) notation. Finally, a canonical model has been constructed by rational reconstruction. Although the model has not yet been tested, it has been reviewed by subject matter experts. The paper describes the search methodology, the SADT analysis, the shortcomings of each model, rational reconstruction, and the canonical model. Further work will include elaborating the canonical model to identify the resources needed to set up a Cyber Security Operations Centre with offensive capabilities and to cross-compare the model with the literature on attack ontologies.enOffensive cyber operationsProcess modelRational reconstructionCanonical modelFormalisationStructured analysis and design techniqueSADTComparing models of offensive cyber operationsConference PresentationGrant, T., Burke, I. D., & Van Heerden, R. P. (2012). Comparing models of offensive cyber operations. Academic Conferences International Ltd. http://hdl.handle.net/10204/6619Grant, T, Ivan D Burke, and Renier P Van Heerden. "Comparing models of offensive cyber operations." (2012): http://hdl.handle.net/10204/6619Grant T, Burke ID, Van Heerden RP, Comparing models of offensive cyber operations; Academic Conferences International Ltd; 2012. http://hdl.handle.net/10204/6619 .TY - Conference Presentation AU - Grant, T AU - Burke, Ivan D AU - Van Heerden, Renier P AB - The purpose of this paper is to find, formalise, and compare models of the offensive cyber operations process available in the open scientific literature. Seven models were sufficiently well described for formalisation using Structured Analysis and Design Technique (SADT) notation. Finally, a canonical model has been constructed by rational reconstruction. Although the model has not yet been tested, it has been reviewed by subject matter experts. The paper describes the search methodology, the SADT analysis, the shortcomings of each model, rational reconstruction, and the canonical model. Further work will include elaborating the canonical model to identify the resources needed to set up a Cyber Security Operations Centre with offensive capabilities and to cross-compare the model with the literature on attack ontologies. DA - 2012-03 DB - ResearchSpace DP - CSIR KW - Offensive cyber operations KW - Process model KW - Rational reconstruction KW - Canonical model KW - Formalisation KW - Structured analysis and design technique KW - SADT LK - https://researchspace.csir.co.za PY - 2012 T1 - Comparing models of offensive cyber operations TI - Comparing models of offensive cyber operations UR - http://hdl.handle.net/10204/6619 ER -