dc.contributor.author |
Van Heerden, Renier P
|
|
dc.contributor.author |
Pieterse, Heloise
|
|
dc.contributor.author |
Irwin, B
|
|
dc.date.accessioned |
2012-12-11T09:27:34Z |
|
dc.date.available |
2012-12-11T09:27:34Z |
|
dc.date.issued |
2012-09 |
|
dc.identifier.citation |
Van Heerden, R, Pieterse, H and Irwin, B. Mapping the most significant computer hacking events to a temporal computer attack model. IFIP's Human Choice and Computers, International Conference 10 (HCC10), ICT Critical Infrastructures and Society, VU University Amsterdam, 27-28 September 2012 |
en_US |
dc.identifier.uri |
http://link.springer.com/chapter/10.1007/978-3-642-33332-3_21?null
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/6405
|
|
dc.description |
IFIP's Human Choice and Computers, International Conference 10 (HCC10), ICT Critical Infrastructures and Society, VU University Amsterdam, 27-28 September 2012. Published in IFIP Advances in Information and Communication Technology Volume 386, 2012, pp 226-236. |
en_US |
dc.description.abstract |
This paper presents 8 of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The Attack stage is separated into: Ramp-up, Damage and Residue. This paper demonstrates how our 18 significant hacking events are mapped to the temporal computer attack model. The temporal computer attack model becomes a valuable asset in the protection of critical infrastructure by being able to detect similar attacks earlier. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Springer |
en_US |
dc.relation.ispartofseries |
Workflow;9927 |
|
dc.subject |
Computer hacking |
en_US |
dc.subject |
Computer hacking events |
en_US |
dc.subject |
Computer attacks |
en_US |
dc.subject |
Computer attack models |
en_US |
dc.subject |
Ontology |
en_US |
dc.subject |
Network attack prediction |
en_US |
dc.title |
Mapping the most significant computer hacking events to a temporal computer attack model |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Van Heerden, R. P., Pieterse, H., & Irwin, B. (2012). Mapping the most significant computer hacking events to a temporal computer attack model. Springer. http://hdl.handle.net/10204/6405 |
en_ZA |
dc.identifier.chicagocitation |
Van Heerden, Renier P, Heloise Pieterse, and B Irwin. "Mapping the most significant computer hacking events to a temporal computer attack model." (2012): http://hdl.handle.net/10204/6405 |
en_ZA |
dc.identifier.vancouvercitation |
Van Heerden RP, Pieterse H, Irwin B, Mapping the most significant computer hacking events to a temporal computer attack model; Springer; 2012. http://hdl.handle.net/10204/6405 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Van Heerden, Renier P
AU - Pieterse, Heloise
AU - Irwin, B
AB - This paper presents 8 of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The Attack stage is separated into: Ramp-up, Damage and Residue. This paper demonstrates how our 18 significant hacking events are mapped to the temporal computer attack model. The temporal computer attack model becomes a valuable asset in the protection of critical infrastructure by being able to detect similar attacks earlier.
DA - 2012-09
DB - ResearchSpace
DP - CSIR
KW - Computer hacking
KW - Computer hacking events
KW - Computer attacks
KW - Computer attack models
KW - Ontology
KW - Network attack prediction
LK - https://researchspace.csir.co.za
PY - 2012
T1 - Mapping the most significant computer hacking events to a temporal computer attack model
TI - Mapping the most significant computer hacking events to a temporal computer attack model
UR - http://hdl.handle.net/10204/6405
ER -
|
en_ZA |