This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The Attack stage is separated into: Ramp-up, Damage and Residue. This paper demonstrates how our 18 significant hacking events are mapped to the temporal computer attack model. The temporal computer attack model becomes a valuable asset in the protection of critical infrastructure by being able to detect similar attacks earlier.
Reference:
Van Heerden, RP, Irwin, B and Burke, ID. Classifying network attack scenarios using an ontology. Proceedings of the 7th International Conference on Information Warfare and Security, University of Washington, Seattle, 22-23 March 2012, pp 311-324
Van Heerden, R. P., Irwin, B., & Burke, I. D. (2012). Classifying network attack scenarios using an ontology. Academic Conferences Limited. http://hdl.handle.net/10204/6388
Van Heerden, Renier P, B Irwin, and Ivan D Burke. "Classifying network attack scenarios using an ontology." (2012): http://hdl.handle.net/10204/6388
Van Heerden RP, Irwin B, Burke ID, Classifying network attack scenarios using an ontology; Academic Conferences Limited; 2012. http://hdl.handle.net/10204/6388 .