ResearchSpace

A computer network attack taxonomy and ontology

Show simple item record

dc.contributor.author Van Heerden, Renier P
dc.contributor.author Irwin, B
dc.contributor.author Burke, Ivan D
dc.contributor.author Leenen, L
dc.date.accessioned 2014-02-13T09:06:40Z
dc.date.available 2014-02-13T09:06:40Z
dc.date.issued 2012
dc.identifier.citation Van Heerden, R.P, Irwin, B, Burke, I.D and Leenen, L. 2012. A computer network attack taxonomy and ontology. vol. 2(3), pp 12-25 en_US
dc.identifier.issn 1947-3435
dc.identifier.uri http://www.igi-global.com/article/a-computer-network-attack-taxonomy-and-ontology/86073
dc.identifier.uri http://hdl.handle.net/10204/7217
dc.description Copyright: 2012 IGI Global. This is an pre/post print version of the work. The definitive version is published in International Journal of Cyber Warfare and Terrorism, vol. 2(3), pp 12-25 en_US
dc.description.abstract Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has the consequence that no standard classification exists. The benefit of automated classification of attacks, means that an attack could be mitigated accordingly. The authors extend a previous, initial taxonomy of computer network attacks which forms the basis of a proposed network attack ontology in this paper. The objective of this ontology is to automate the classification of a network attack during its early stages. Most published taxonomies present an attack from either the attacker's or defender's point of view. The authors’ taxonomy presents both these points of view. The framework for an ontology was developed using a core class, the “Attack Scenario”, which can be used to characterize and classify computer network attacks. en_US
dc.language.iso en en_US
dc.publisher IGI Global Publishing en_US
dc.relation.ispartofseries Workflow;11637
dc.subject Computer network attacks en_US
dc.subject Cyber warfare en_US
dc.subject Terrorism en_US
dc.subject Network attack taxonomy en_US
dc.subject Network attack ontology en_US
dc.title A computer network attack taxonomy and ontology en_US
dc.type Article en_US
dc.identifier.apacitation Van Heerden, R. P., Irwin, B., Burke, I. D., & Leenen, L. (2012). A computer network attack taxonomy and ontology. http://hdl.handle.net/10204/7217 en_ZA
dc.identifier.chicagocitation Van Heerden, Renier P, B Irwin, Ivan D Burke, and L Leenen "A computer network attack taxonomy and ontology." (2012) http://hdl.handle.net/10204/7217 en_ZA
dc.identifier.vancouvercitation Van Heerden RP, Irwin B, Burke ID, Leenen L. A computer network attack taxonomy and ontology. 2012; http://hdl.handle.net/10204/7217. en_ZA
dc.identifier.ris TY - Article AU - Van Heerden, Renier P AU - Irwin, B AU - Burke, Ivan D AU - Leenen, L AB - Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has the consequence that no standard classification exists. The benefit of automated classification of attacks, means that an attack could be mitigated accordingly. The authors extend a previous, initial taxonomy of computer network attacks which forms the basis of a proposed network attack ontology in this paper. The objective of this ontology is to automate the classification of a network attack during its early stages. Most published taxonomies present an attack from either the attacker's or defender's point of view. The authors’ taxonomy presents both these points of view. The framework for an ontology was developed using a core class, the “Attack Scenario”, which can be used to characterize and classify computer network attacks. DA - 2012 DB - ResearchSpace DP - CSIR KW - Computer network attacks KW - Cyber warfare KW - Terrorism KW - Network attack taxonomy KW - Network attack ontology LK - https://researchspace.csir.co.za PY - 2012 SM - 1947-3435 T1 - A computer network attack taxonomy and ontology TI - A computer network attack taxonomy and ontology UR - http://hdl.handle.net/10204/7217 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record