ResearchSpace

Using an ontology for network attack planning

Show simple item record

dc.contributor.author Van Heerden, Renier P
dc.contributor.author Chan, Ka Fai P
dc.contributor.author Leenen, L
dc.contributor.author Theron, J
dc.date.accessioned 2017-02-03T08:35:43Z
dc.date.available 2017-02-03T08:35:43Z
dc.date.issued 2016-09
dc.identifier.citation Van Heerden, R., Chan, P., Leenen, L. and Theron, J. 2016. Using an ontology for network attack planning. International Journal of Cyber Warfare and Terrorism, 6(3), pp 65-78 en_US
dc.identifier.issn 1947-3443
dc.identifier.uri http://www.igi-global.com/article/using-an-ontology-for-network-attack-planning/159885
dc.identifier.uri http://hdl.handle.net/10204/8929
dc.description Copyright: 2015 IGI Global. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website. The definitive version of the work is published in International Journal of Cyber Warfare and Terrorism, 6(3), pp 65-78 en_US
dc.description.abstract The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within the cyber domain. The amount of cyber information is increasing constantly and the time that information stays relevant and valuable in decreasing similarly. Thus semantic technologies can contribute towards the intelligent processing of information in this ever-changing environment. An ontology enables the representation of semantic information. In additional, automated reasoning can enrich the representation by inferring unknown relationships. The inferences that can be made with the automated reasoning capabilities of ontologies provide a unique insight into the relationships between network targets and attacks, compared to traditional databases. en_US
dc.language.iso en en_US
dc.publisher IGI Global en_US
dc.relation.ispartofseries Wokflow;17522
dc.subject Command and control en_US
dc.subject Cyber operations en_US
dc.subject Cyber warfare en_US
dc.subject Network attack planning en_US
dc.subject Ontologies en_US
dc.title Using an ontology for network attack planning en_US
dc.type Article en_US
dc.identifier.apacitation Van Heerden, R. P., Chan, K. F. P., Leenen, L., & Theron, J. (2016). Using an ontology for network attack planning. http://hdl.handle.net/10204/8929 en_ZA
dc.identifier.chicagocitation Van Heerden, Renier P, Ka Fai P Chan, L Leenen, and J Theron "Using an ontology for network attack planning." (2016) http://hdl.handle.net/10204/8929 en_ZA
dc.identifier.vancouvercitation Van Heerden RP, Chan KFP, Leenen L, Theron J. Using an ontology for network attack planning. 2016; http://hdl.handle.net/10204/8929. en_ZA
dc.identifier.ris TY - Article AU - Van Heerden, Renier P AU - Chan, Ka Fai P AU - Leenen, L AU - Theron, J AB - The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within the cyber domain. The amount of cyber information is increasing constantly and the time that information stays relevant and valuable in decreasing similarly. Thus semantic technologies can contribute towards the intelligent processing of information in this ever-changing environment. An ontology enables the representation of semantic information. In additional, automated reasoning can enrich the representation by inferring unknown relationships. The inferences that can be made with the automated reasoning capabilities of ontologies provide a unique insight into the relationships between network targets and attacks, compared to traditional databases. DA - 2016-09 DB - ResearchSpace DP - CSIR KW - Command and control KW - Cyber operations KW - Cyber warfare KW - Network attack planning KW - Ontologies LK - https://researchspace.csir.co.za PY - 2016 SM - 1947-3443 T1 - Using an ontology for network attack planning TI - Using an ontology for network attack planning UR - http://hdl.handle.net/10204/8929 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record