Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model

Conference object English OPEN
Heerden , Renier ,; Pieterse , Heloise; Irwin , Barry;
(2012)
  • Publisher: Springer
  • Related identifiers: doi: 10.1007/978-3-642-33332-3_21
  • Subject: computer attack model | [ INFO ] Computer Science [cs] | network attack prediction | ontology

Part 4: Section 3: ICT for Peace and War; International audience; This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A t... View more
  • References (21)
    21 references, page 1 of 3

    1. Heater, B.: Male: A Brief Timeline (2011), http://www.pcmag.com/slideshow/story/261678/malware-a-brief-timeline/

    2. Hall, K.: The 7 worstcyberattacks in history (that we know about) (2012), http://dvice.com/archives/2010/09/7-of-the-most-d.php

    3. Julian: 10 Most Costly Cyber Attacks in History (2011), http://www.businesspundit.com/10-most-costly-cyber-attacks-in-history/

    4. van Heerden, R.P., Irwin B., Burke, I.D.: Classifying Network Attack Scenarios using an Ontology. In: Proceedings of the 7th International Conference on Information Warfare and Security, pp. 331-324 (2012)

    5. Desai, P.: Towards an undetectable computer virus, Master's thesis, San Jose State University (2008), http://www.cs.sjsu.edu/faculty/stamp/students/Desai_Priti.pdf

    6. Subramanya, S.R., Lakshminarasimhan, N.: Computer viruses. Potential IEEE, 20(4), pp. 16-19 (2001)

    7. Blümler, P.: I-LOVE-YOU: Viruses, Trojan Horses and Worms, www.econmr.org/datapool/page/30/virus.pdf

    8. Orman, H.: The Morris worm: a fifteen-year perspective. Security & Privacy, IEEE, 1(5), pp. 35-43 (2003)

    9. Chen, T.M., Robert J.M.: Worm epidemics in high-speed networks. Computer, 37(6), pp. 48-53 (2004)

    10. Cass, S.: Anatomy of malice [computer viruses]. Spectrum, IEEE, 38(11), pp. 56-60 (2004)

  • Metrics
Share - Bookmark