Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model

  • Renier van Heerden
  • Heloise Pieterse
  • Barry Irwin
Conference paper

DOI: 10.1007/978-3-642-33332-3_21

Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 386)
Cite this paper as:
van Heerden R., Pieterse H., Irwin B. (2012) Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model. In: Hercheui M.D., Whitehouse D., McIver W., Phahlamohlaka J. (eds) ICT Critical Infrastructures and Society. HCC 2012. IFIP Advances in Information and Communication Technology, vol 386. Springer, Berlin, Heidelberg

Abstract

This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The Attack stage is separated into: Ramp-up, Damage and Residue. This paper demonstrates how our eight significant hacking events are mapped to the temporal computer attack model. The temporal computer attack model becomes a valuable asset in the protection of critical infrastructure by being able to detect similar attacks earlier.

Keywords

computer attack model ontology network attack prediction 

Copyright information

© IFIP International Federation for Information Processing 2012

Authors and Affiliations

  • Renier van Heerden
    • 1
    • 2
  • Heloise Pieterse
    • 1
  • Barry Irwin
    • 2
  1. 1.Council for Scientific and Industrial ResearchPretoriaSouth Africa
  2. 2.Rhodes UniversityGrahamstownSouth Africa

Personalised recommendations