Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model

Abstract : This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The Attack stage is separated into: Ramp-up, Damage and Residue. This paper demonstrates how our eight significant hacking events are mapped to the temporal computer attack model. The temporal computer attack model becomes a valuable asset in the protection of critical infrastructure by being able to detect similar attacks earlier.
Document type :
Conference papers
Liste complète des métadonnées

Cited literature [19 references]  Display  Hide  Download

https://hal.inria.fr/hal-01525096
Contributor : Hal Ifip <>
Submitted on : Friday, May 19, 2017 - 2:42:34 PM
Last modification on : Wednesday, November 29, 2017 - 9:22:56 AM
Document(s) archivé(s) le : Monday, August 21, 2017 - 12:52:24 AM

File

978-3-642-33332-3_21_Chapter.p...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Renier Heerden, Heloise Pieterse, Barry Irwin. Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model. 10th International Conference on Human Choice and Computers (HCC), Sep 2012, Amsterdam, Netherlands. pp.226-236, ⟨10.1007/978-3-642-33332-3_21⟩. ⟨hal-01525096⟩

Share

Metrics

Record views

349

Files downloads

43