EconPapers    
Economics at your fingertips  
 

Using an Ontology for Network Attack Planning

Renier van Heerden, Peter Chan, Louise Leenen and Jacques Theron
Additional contact information
Renier van Heerden: Council for Scientific and Industrial Research (CSIR) and Nelson Mandela Metropolitan University, South Africa
Peter Chan: Council for Scientific and Industrial Research (CSIR), Pretoria, South Africa
Louise Leenen: Council for Scientific and Industrial Research (CSIR), Pretoria and Cape Peninsula University of Technology, Cape Town, South Africa
Jacques Theron: South African National Defence Force (SANDF), Pretoria, South Africa

International Journal of Cyber Warfare and Terrorism (IJCWT), 2016, vol. 6, issue 3, 65-78

Abstract: The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within the cyber domain. The amount of cyber information is increasing constantly and the time that information stays relevant and valuable in decreasing similarly. Thus semantic technologies can contribute towards the intelligent processing of information in this ever-changing environment. An ontology enables the representation of semantic information. In additional, automated reasoning can enrich the representation by inferring unknown relationships. The inferences that can be made with the automated reasoning capabilities of ontologies provide a unique insight into the relationships between network targets and attacks, compared to traditional databases.

Date: 2016
References: Add references at CitEc
Citations: Track citations by RSS feed

Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/IJCWT.2016070106 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:igg:jcwt00:v:6:y:2016:i:3:p:65-78

Access Statistics for this article

More articles in International Journal of Cyber Warfare and Terrorism (IJCWT) from IGI Global
Bibliographic data for series maintained by Journal Editor ().

 
Page updated 2019-11-24
Handle: RePEc:igg:jcwt00:v:6:y:2016:i:3:p:65-78