Skip to Main content Skip to Navigation
Conference papers

Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model

Abstract : This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The Attack stage is separated into: Ramp-up, Damage and Residue. This paper demonstrates how our eight significant hacking events are mapped to the temporal computer attack model. The temporal computer attack model becomes a valuable asset in the protection of critical infrastructure by being able to detect similar attacks earlier.
Document type :
Conference papers
Complete list of metadata

Cited literature [19 references]  Display  Hide  Download
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Friday, May 19, 2017 - 2:42:34 PM
Last modification on : Sunday, November 22, 2020 - 1:54:01 PM
Long-term archiving on: : Monday, August 21, 2017 - 12:52:24 AM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Renier Van Heerden, Heloise Pieterse, Barry Irwin. Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model. 10th International Conference on Human Choice and Computers (HCC), Sep 2012, Amsterdam, Netherlands. pp.226-236, ⟨10.1007/978-3-642-33332-3_21⟩. ⟨hal-01525096⟩



Record views


Files downloads