dc.contributor.author |
Van Heerden, Renier P
|
|
dc.contributor.author |
Irwin, B
|
|
dc.contributor.author |
Burke, Ivan D
|
|
dc.date.accessioned |
2012-11-29T13:20:20Z |
|
dc.date.available |
2012-11-29T13:20:20Z |
|
dc.date.issued |
2012-03 |
|
dc.identifier.citation |
Van Heerden, RP, Irwin, B and Burke, ID. Classifying network attack scenarios using an ontology. Proceedings of the 7th International Conference on Information Warfare and Security, University of Washington, Seattle, 22-23 March 2012, pp 311-324 |
en_US |
dc.identifier.isbn |
978-1-908272-30-0 |
|
dc.identifier.isbn |
978-1-908272-29-4 |
|
dc.identifier.uri |
http://hdl.handle.net/10204/6388
|
|
dc.description |
Proceedings of the 7th International Conference on Information Warfare and Security, University of Washington, Seattle, 22-23 March 2012 |
en_US |
dc.description.abstract |
This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The Attack stage is separated into: Ramp-up, Damage and Residue. This paper demonstrates how our 18 significant hacking events are mapped to the temporal computer attack model. The temporal computer attack model becomes a valuable asset in the protection of critical infrastructure by being able to detect similar attacks earlier. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Academic Conferences Limited |
en_US |
dc.relation.ispartofseries |
Workflow;9923 |
|
dc.subject |
Network attacks |
en_US |
dc.subject |
Information warfare |
en_US |
dc.subject |
Information security |
en_US |
dc.subject |
Ontology |
en_US |
dc.subject |
Taxonomy |
en_US |
dc.title |
Classifying network attack scenarios using an ontology |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Van Heerden, R. P., Irwin, B., & Burke, I. D. (2012). Classifying network attack scenarios using an ontology. Academic Conferences Limited. http://hdl.handle.net/10204/6388 |
en_ZA |
dc.identifier.chicagocitation |
Van Heerden, Renier P, B Irwin, and Ivan D Burke. "Classifying network attack scenarios using an ontology." (2012): http://hdl.handle.net/10204/6388 |
en_ZA |
dc.identifier.vancouvercitation |
Van Heerden RP, Irwin B, Burke ID, Classifying network attack scenarios using an ontology; Academic Conferences Limited; 2012. http://hdl.handle.net/10204/6388 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Van Heerden, Renier P
AU - Irwin, B
AU - Burke, Ivan D
AB - This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The Attack stage is separated into: Ramp-up, Damage and Residue. This paper demonstrates how our 18 significant hacking events are mapped to the temporal computer attack model. The temporal computer attack model becomes a valuable asset in the protection of critical infrastructure by being able to detect similar attacks earlier.
DA - 2012-03
DB - ResearchSpace
DP - CSIR
KW - Network attacks
KW - Information warfare
KW - Information security
KW - Ontology
KW - Taxonomy
LK - https://researchspace.csir.co.za
PY - 2012
SM - 978-1-908272-30-0
SM - 978-1-908272-29-4
T1 - Classifying network attack scenarios using an ontology
TI - Classifying network attack scenarios using an ontology
UR - http://hdl.handle.net/10204/6388
ER -
|
en_ZA |