dc.contributor.author |
Grant, T
|
|
dc.contributor.author |
Burke, Ivan D
|
|
dc.contributor.author |
Van Heerden, Renier P
|
|
dc.date.accessioned |
2013-03-25T07:09:54Z |
|
dc.date.available |
2013-03-25T07:09:54Z |
|
dc.date.issued |
2012-03 |
|
dc.identifier.citation |
Grant, T, Burke, I and Van Heerden, R. 2012. Comparing models of offensive cyber operations. In: 7th International Conference on Information Warfare and Security, University of Washington, Seattle, USA, 22-23 March 2012 |
en_US |
dc.identifier.uri |
http://connection.ebscohost.com/c/articles/74572640/comparing-models-offensive-cyber-operations
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/6619
|
|
dc.description |
7th International Conference on Information Warfare and Security, University of Washington, Seattle, USA, 22-23 March 2012 |
en_US |
dc.description.abstract |
The purpose of this paper is to find, formalise, and compare models of the offensive cyber operations process available in the open scientific literature. Seven models were sufficiently well described for formalisation using Structured Analysis and Design Technique (SADT) notation. Finally, a canonical model has been constructed by rational reconstruction. Although the model has not yet been tested, it has been reviewed by subject matter experts. The paper describes the search methodology, the SADT analysis, the shortcomings of each model, rational reconstruction, and the canonical model. Further work will include elaborating the canonical model to identify the resources needed to set up a Cyber Security Operations Centre with offensive capabilities and to cross-compare the model with the literature on attack ontologies. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Academic Conferences International Ltd |
en_US |
dc.relation.ispartofseries |
Workflow;10395 |
|
dc.subject |
Offensive cyber operations |
en_US |
dc.subject |
Process model |
en_US |
dc.subject |
Rational reconstruction |
en_US |
dc.subject |
Canonical model |
en_US |
dc.subject |
Formalisation |
en_US |
dc.subject |
Structured analysis and design technique |
en_US |
dc.subject |
SADT |
en_US |
dc.title |
Comparing models of offensive cyber operations |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Grant, T., Burke, I. D., & Van Heerden, R. P. (2012). Comparing models of offensive cyber operations. Academic Conferences International Ltd. http://hdl.handle.net/10204/6619 |
en_ZA |
dc.identifier.chicagocitation |
Grant, T, Ivan D Burke, and Renier P Van Heerden. "Comparing models of offensive cyber operations." (2012): http://hdl.handle.net/10204/6619 |
en_ZA |
dc.identifier.vancouvercitation |
Grant T, Burke ID, Van Heerden RP, Comparing models of offensive cyber operations; Academic Conferences International Ltd; 2012. http://hdl.handle.net/10204/6619 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Grant, T
AU - Burke, Ivan D
AU - Van Heerden, Renier P
AB - The purpose of this paper is to find, formalise, and compare models of the offensive cyber operations process available in the open scientific literature. Seven models were sufficiently well described for formalisation using Structured Analysis and Design Technique (SADT) notation. Finally, a canonical model has been constructed by rational reconstruction. Although the model has not yet been tested, it has been reviewed by subject matter experts. The paper describes the search methodology, the SADT analysis, the shortcomings of each model, rational reconstruction, and the canonical model. Further work will include elaborating the canonical model to identify the resources needed to set up a Cyber Security Operations Centre with offensive capabilities and to cross-compare the model with the literature on attack ontologies.
DA - 2012-03
DB - ResearchSpace
DP - CSIR
KW - Offensive cyber operations
KW - Process model
KW - Rational reconstruction
KW - Canonical model
KW - Formalisation
KW - Structured analysis and design technique
KW - SADT
LK - https://researchspace.csir.co.za
PY - 2012
T1 - Comparing models of offensive cyber operations
TI - Comparing models of offensive cyber operations
UR - http://hdl.handle.net/10204/6619
ER -
|
en_ZA |