Van Heerden, Renier PLeenen, LIrwin, B2014-02-132014-02-132013-11Van Heerden, R, Leenen, L and Irwin, B. 2013. Automated classification of computer network attacks. In: 5th Workshop on ICT Uses in Warfare and the Safeguarding of Peace (IWSP'13), 25-27 November 2013http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=06707510http://hdl.handle.net/10204/71865th Workshop on ICT Uses in Warfare and the Safeguarding of Peace (IWSP'13), 25-27 November 2013. Published in IEEE Explore.In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes and inter-class relationships and has previously been implemented in the Protege ontology editor. Two significant recent instances of network based attacks are presented as individuals in the ontology and correctly classified by the automated reasoner according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank in 2012.enComputer network attacksWarfarePeace safeguardingHermiTAutomated classification of computer network attacksConference PresentationVan Heerden, R. P., Leenen, L., & Irwin, B. (2013). Automated classification of computer network attacks. IEEE Xplore. http://hdl.handle.net/10204/7186Van Heerden, Renier P, L Leenen, and B Irwin. "Automated classification of computer network attacks." (2013): http://hdl.handle.net/10204/7186Van Heerden RP, Leenen L, Irwin B, Automated classification of computer network attacks; IEEE Xplore; 2013. http://hdl.handle.net/10204/7186 .TY - Conference Presentation AU - Van Heerden, Renier P AU - Leenen, L AU - Irwin, B AB - In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes and inter-class relationships and has previously been implemented in the Protege ontology editor. Two significant recent instances of network based attacks are presented as individuals in the ontology and correctly classified by the automated reasoner according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank in 2012. DA - 2013-11 DB - ResearchSpace DP - CSIR KW - Computer network attacks KW - Warfare KW - Peace safeguarding KW - HermiT LK - https://researchspace.csir.co.za PY - 2013 T1 - Automated classification of computer network attacks TI - Automated classification of computer network attacks UR - http://hdl.handle.net/10204/7186 ER -