Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model - ICT Critical Infrastructures and Society Access content directly
Conference Papers Year : 2012

Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model

Abstract

This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The Attack stage is separated into: Ramp-up, Damage and Residue. This paper demonstrates how our eight significant hacking events are mapped to the temporal computer attack model. The temporal computer attack model becomes a valuable asset in the protection of critical infrastructure by being able to detect similar attacks earlier.
Fichier principal
Vignette du fichier
978-3-642-33332-3_21_Chapter.pdf (255.41 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01525096 , version 1 (19-05-2017)

Licence

Attribution

Identifiers

Cite

Renier Van Heerden, Heloise Pieterse, Barry Irwin. Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model. 10th International Conference on Human Choice and Computers (HCC), Sep 2012, Amsterdam, Netherlands. pp.226-236, ⟨10.1007/978-3-642-33332-3_21⟩. ⟨hal-01525096⟩
408 View
130 Download

Altmetric

Share

Gmail Facebook X LinkedIn More