dc.contributor.author |
Van Heerden, Renier P
|
|
dc.contributor.author |
Irwin, B
|
|
dc.contributor.author |
Burke, Ivan D
|
|
dc.contributor.author |
Leenen, L
|
|
dc.date.accessioned |
2014-02-13T09:06:40Z |
|
dc.date.available |
2014-02-13T09:06:40Z |
|
dc.date.issued |
2012 |
|
dc.identifier.citation |
Van Heerden, R.P, Irwin, B, Burke, I.D and Leenen, L. 2012. A computer network attack taxonomy and ontology. vol. 2(3), pp 12-25 |
en_US |
dc.identifier.issn |
1947-3435 |
|
dc.identifier.uri |
http://www.igi-global.com/article/a-computer-network-attack-taxonomy-and-ontology/86073
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/7217
|
|
dc.description |
Copyright: 2012 IGI Global. This is an pre/post print version of the work. The definitive version is published in International Journal of Cyber Warfare and Terrorism, vol. 2(3), pp 12-25 |
en_US |
dc.description.abstract |
Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has the consequence that no standard classification exists. The benefit of automated classification of attacks, means that an attack could be mitigated accordingly. The authors extend a previous, initial taxonomy of computer network attacks which forms the basis of a proposed network attack ontology in this paper. The objective of this ontology is to automate the classification of a network attack during its early stages. Most published taxonomies present an attack from either the attacker's or defender's point of view. The authors’ taxonomy presents both these points of view. The framework for an ontology was developed using a core class, the “Attack Scenario”, which can be used to characterize and classify computer network attacks. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IGI Global Publishing |
en_US |
dc.relation.ispartofseries |
Workflow;11637 |
|
dc.subject |
Computer network attacks |
en_US |
dc.subject |
Cyber warfare |
en_US |
dc.subject |
Terrorism |
en_US |
dc.subject |
Network attack taxonomy |
en_US |
dc.subject |
Network attack ontology |
en_US |
dc.title |
A computer network attack taxonomy and ontology |
en_US |
dc.type |
Article |
en_US |
dc.identifier.apacitation |
Van Heerden, R. P., Irwin, B., Burke, I. D., & Leenen, L. (2012). A computer network attack taxonomy and ontology. http://hdl.handle.net/10204/7217 |
en_ZA |
dc.identifier.chicagocitation |
Van Heerden, Renier P, B Irwin, Ivan D Burke, and L Leenen "A computer network attack taxonomy and ontology." (2012) http://hdl.handle.net/10204/7217 |
en_ZA |
dc.identifier.vancouvercitation |
Van Heerden RP, Irwin B, Burke ID, Leenen L. A computer network attack taxonomy and ontology. 2012; http://hdl.handle.net/10204/7217. |
en_ZA |
dc.identifier.ris |
TY - Article
AU - Van Heerden, Renier P
AU - Irwin, B
AU - Burke, Ivan D
AU - Leenen, L
AB - Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has the consequence that no standard classification exists. The benefit of automated classification of attacks, means that an attack could be mitigated accordingly. The authors extend a previous, initial taxonomy of computer network attacks which forms the basis of a proposed network attack ontology in this paper. The objective of this ontology is to automate the classification of a network attack during its early stages. Most published taxonomies present an attack from either the attacker's or defender's point of view. The authors’ taxonomy presents both these points of view. The framework for an ontology was developed using a core class, the “Attack Scenario”, which can be used to characterize and classify computer network attacks.
DA - 2012
DB - ResearchSpace
DP - CSIR
KW - Computer network attacks
KW - Cyber warfare
KW - Terrorism
KW - Network attack taxonomy
KW - Network attack ontology
LK - https://researchspace.csir.co.za
PY - 2012
SM - 1947-3435
T1 - A computer network attack taxonomy and ontology
TI - A computer network attack taxonomy and ontology
UR - http://hdl.handle.net/10204/7217
ER -
|
en_ZA |