- Title
- Mapping the most significant computer hacking events to a temporal computer attack model
- Creator
- Van Heerden, Renier, Pieterse, Heloise, Irwin, Barry V W
- Subject
- To be catalogued
- Date
- 2012
- Type
- text
- Type
- article
- Identifier
- http://hdl.handle.net/10962/429950
- Identifier
- vital:72654
- Identifier
- https://doi.org/10.1007/978-3-642-33332-3_21
- Description
- This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Recon-naissance stages. The Attack stage is separated into: Ramp-up, Dam-age and Residue. This paper demonstrates how our eight significant hacking events are mapped to the temporal computer attack model. The temporal computer attack model becomes a valuable asset in the protection of critical infrastructure by being able to detect similar attacks earlier.
- Format
- 10 pages, pdf
- Language
- English
- Relation
- ICT Critical Infrastructures and Society: 10th IFIP TC 9 International Conference on Human Choice and Computers, Van Heerden, R., Pieterse, H. and Irwin, B., 2012. Mapping the most significant computer hacking events to a temporal computer attack model. In ICT Critical Infrastructures and Society: 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, Amsterdam, The Netherlands, September 27-28, 2012. Proceedings 10 (pp. 226-236). Springer Berlin Heidelberg, ICT Critical Infrastructures and Society: 10th IFIP TC 9 International Conference on Human Choice and Computers volume 2012 number 1 262 236 2012 978-3-642-33331-6
- Rights
- Publisher
- Rights
- Use of this resource is governed by the terms and conditions of the SpringerLink Terms of Use Statement ( https://link.springer.com/termsandconditions)
- Hits: 140
- Visitors: 143
- Downloads: 7
Thumbnail | File | Description | Size | Format | |||
---|---|---|---|---|---|---|---|
View Details Download | SOURCE1 | Mapping the most significant computer hacking events to a temporal computer attack model.pdf | 700 KB | Adobe Acrobat PDF | View Details Download |