The purpose of this paper is to find, formalise, and compare models of the offensive cyber operations process available in the open scientific literature. Seven models were sufficiently well described for formalisation using Structured Analysis and Design Technique (SADT) notation. Finally, a canonical model has been constructed by rational reconstruction. Although the model has not yet been tested, it has been reviewed by subject matter experts. The paper describes the search methodology, the SADT analysis, the shortcomings of each model, rational reconstruction, and the canonical model. Further work will include elaborating the canonical model to identify the resources needed to set up a Cyber Security Operations Centre with offensive capabilities and to cross-compare the model with the literature on attack ontologies.
Reference:
Grant, T, Burke, I and Van Heerden, R. 2012. Comparing models of offensive cyber operations. In: 7th International Conference on Information Warfare and Security, University of Washington, Seattle, USA, 22-23 March 2012
Grant, T., Burke, I. D., & Van Heerden, R. P. (2012). Comparing models of offensive cyber operations. Academic Conferences International Ltd. http://hdl.handle.net/10204/6619
Grant, T, Ivan D Burke, and Renier P Van Heerden. "Comparing models of offensive cyber operations." (2012): http://hdl.handle.net/10204/6619
Grant T, Burke ID, Van Heerden RP, Comparing models of offensive cyber operations; Academic Conferences International Ltd; 2012. http://hdl.handle.net/10204/6619 .