ResearchSpace

Comparing models of offensive cyber operations

Show simple item record

dc.contributor.author Grant, T
dc.contributor.author Burke, Ivan D
dc.contributor.author Van Heerden, Renier P
dc.date.accessioned 2013-03-25T07:09:54Z
dc.date.available 2013-03-25T07:09:54Z
dc.date.issued 2012-03
dc.identifier.citation Grant, T, Burke, I and Van Heerden, R. 2012. Comparing models of offensive cyber operations. In: 7th International Conference on Information Warfare and Security, University of Washington, Seattle, USA, 22-23 March 2012 en_US
dc.identifier.uri http://connection.ebscohost.com/c/articles/74572640/comparing-models-offensive-cyber-operations
dc.identifier.uri http://hdl.handle.net/10204/6619
dc.description 7th International Conference on Information Warfare and Security, University of Washington, Seattle, USA, 22-23 March 2012 en_US
dc.description.abstract The purpose of this paper is to find, formalise, and compare models of the offensive cyber operations process available in the open scientific literature. Seven models were sufficiently well described for formalisation using Structured Analysis and Design Technique (SADT) notation. Finally, a canonical model has been constructed by rational reconstruction. Although the model has not yet been tested, it has been reviewed by subject matter experts. The paper describes the search methodology, the SADT analysis, the shortcomings of each model, rational reconstruction, and the canonical model. Further work will include elaborating the canonical model to identify the resources needed to set up a Cyber Security Operations Centre with offensive capabilities and to cross-compare the model with the literature on attack ontologies. en_US
dc.language.iso en en_US
dc.publisher Academic Conferences International Ltd en_US
dc.relation.ispartofseries Workflow;10395
dc.subject Offensive cyber operations en_US
dc.subject Process model en_US
dc.subject Rational reconstruction en_US
dc.subject Canonical model en_US
dc.subject Formalisation en_US
dc.subject Structured analysis and design technique en_US
dc.subject SADT en_US
dc.title Comparing models of offensive cyber operations en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Grant, T., Burke, I. D., & Van Heerden, R. P. (2012). Comparing models of offensive cyber operations. Academic Conferences International Ltd. http://hdl.handle.net/10204/6619 en_ZA
dc.identifier.chicagocitation Grant, T, Ivan D Burke, and Renier P Van Heerden. "Comparing models of offensive cyber operations." (2012): http://hdl.handle.net/10204/6619 en_ZA
dc.identifier.vancouvercitation Grant T, Burke ID, Van Heerden RP, Comparing models of offensive cyber operations; Academic Conferences International Ltd; 2012. http://hdl.handle.net/10204/6619 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Grant, T AU - Burke, Ivan D AU - Van Heerden, Renier P AB - The purpose of this paper is to find, formalise, and compare models of the offensive cyber operations process available in the open scientific literature. Seven models were sufficiently well described for formalisation using Structured Analysis and Design Technique (SADT) notation. Finally, a canonical model has been constructed by rational reconstruction. Although the model has not yet been tested, it has been reviewed by subject matter experts. The paper describes the search methodology, the SADT analysis, the shortcomings of each model, rational reconstruction, and the canonical model. Further work will include elaborating the canonical model to identify the resources needed to set up a Cyber Security Operations Centre with offensive capabilities and to cross-compare the model with the literature on attack ontologies. DA - 2012-03 DB - ResearchSpace DP - CSIR KW - Offensive cyber operations KW - Process model KW - Rational reconstruction KW - Canonical model KW - Formalisation KW - Structured analysis and design technique KW - SADT LK - https://researchspace.csir.co.za PY - 2012 T1 - Comparing models of offensive cyber operations TI - Comparing models of offensive cyber operations UR - http://hdl.handle.net/10204/6619 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record