dc.contributor.author |
Burke, Ivan D
|
|
dc.contributor.author |
Van Heerden, Renier P
|
|
dc.date.accessioned |
2016-12-08T07:42:09Z |
|
dc.date.available |
2016-12-08T07:42:09Z |
|
dc.date.issued |
2016-03 |
|
dc.identifier.citation |
Burke, I. and Van Heerden, R.P. 2016. Automating cyber offensive operations for cyber challenges. In: 11th International Conference on Cyber Warfare and Security: ICCWS2016, March 2016, Boston, USA |
en_US |
dc.identifier.isbn |
978-1-910810-82-8 |
|
dc.identifier.uri |
http://search.proquest.com/openview/16016445fbacbcbcc010821e7feb268d/1?pq-origsite=gscholar&cbl=396500
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/8884
|
|
dc.description |
11th International Conference on Cyber Warfare and Security: ICCWS2016, March 2016, Boston, USA |
en_US |
dc.description.abstract |
Cyber awareness training has become a growing industry, with more and more organisations starting to focus on training personnel on how to behave in a secure manner when engaging in cyber operations. Cyber challenges place participants in realistic cyber defence scenarios in order to provide training under fire. This paper documents steps taken to develop an automated attack capability for use within a cyber challenge environment. The challenges discussed within this paper focuses on cyber challenges conducted within developing countries, such as South Africa, but the principles discussed within this paper aim to be applicable to be applicable to all cyber challenges in general. The researchers based their work on prior publications covering threat modelling, construction of cyber security testbeds and planning of offensive cyber operations. The work presented in this paper is a practical application of an ontological model for cyber attack scenarios. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Academic Conferences International Limited |
en_US |
dc.relation.ispartofseries |
Wokflow;17488 |
|
dc.subject |
Cyber challenges |
en_US |
dc.subject |
Ontologies |
en_US |
dc.subject |
Attack automation |
en_US |
dc.title |
Automating cyber offensive operations for cyber challenges |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Burke, I. D., & Van Heerden, R. P. (2016). Automating cyber offensive operations for cyber challenges. Academic Conferences International Limited. http://hdl.handle.net/10204/8884 |
en_ZA |
dc.identifier.chicagocitation |
Burke, Ivan D, and Renier P Van Heerden. "Automating cyber offensive operations for cyber challenges." (2016): http://hdl.handle.net/10204/8884 |
en_ZA |
dc.identifier.vancouvercitation |
Burke ID, Van Heerden RP, Automating cyber offensive operations for cyber challenges; Academic Conferences International Limited; 2016. http://hdl.handle.net/10204/8884 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Burke, Ivan D
AU - Van Heerden, Renier P
AB - Cyber awareness training has become a growing industry, with more and more organisations starting to focus on training personnel on how to behave in a secure manner when engaging in cyber operations. Cyber challenges place participants in realistic cyber defence scenarios in order to provide training under fire. This paper documents steps taken to develop an automated attack capability for use within a cyber challenge environment. The challenges discussed within this paper focuses on cyber challenges conducted within developing countries, such as South Africa, but the principles discussed within this paper aim to be applicable to be applicable to all cyber challenges in general. The researchers based their work on prior publications covering threat modelling, construction of cyber security testbeds and planning of offensive cyber operations. The work presented in this paper is a practical application of an ontological model for cyber attack scenarios.
DA - 2016-03
DB - ResearchSpace
DP - CSIR
KW - Cyber challenges
KW - Ontologies
KW - Attack automation
LK - https://researchspace.csir.co.za
PY - 2016
SM - 978-1-910810-82-8
T1 - Automating cyber offensive operations for cyber challenges
TI - Automating cyber offensive operations for cyber challenges
UR - http://hdl.handle.net/10204/8884
ER -
|
en_ZA |