Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model

This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The Attack stage is separated into: Ramp-up, Damage and Residue. This paper demonstrates how our eight significant hacking events are mapped to the temporal computer attack model. The temporal computer attack model becomes a valuable asset in the protection of critical infrastructure by being able to detect similar attacks earlier.

[1]  M. E. Kabay,et al.  Computer Security Handbook , 2002 .

[2]  Gus W Weiss,et al.  The Farewell Dossier , 1996 .

[3]  I Burke,et al.  Classifying network attack scenarios using an ontology , 2012 .

[4]  Stephen D. Wolthusen,et al.  Critical Infrastructure Protection , 2012, Lecture Notes in Computer Science.

[5]  Thomas M. Chen,et al.  Worm epidemics in high-speed networks , 2004, Computer.

[6]  Matt Bishop,et al.  Analysis of the ILOVEYOU Worm , 2000 .

[7]  Philippe Beaucamps,et al.  Advanced Metamorphic Techniques in Computer Viruses , 2007 .

[8]  S. R. Subramanya,et al.  Computer viruses , 2001 .

[9]  Rain Ottis,et al.  Estonia after the 2007 Cyber Attacks: Legal, Strategic and Organisational Changes in Cyber Security , 2011, Int. J. Cyber Warf. Terror..

[10]  Hilarie K. Orman,et al.  The Morris Worm: A Fifteen-Year Perspective , 2003, IEEE Secur. Priv..

[11]  Bernhard Plattner,et al.  Host behaviour based early detection of worm outbreaks in Internet backbones , 2005, 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).

[12]  Deirdre K. Mulligan,et al.  The Magnificence of the Disaster: Reconstructing the Sony Bmg Rootkit Incident , 2008 .

[13]  Priti Desai Towards an Undetectable Computer Virus , 2008 .

[14]  Lee Garber Melissa Virus Creates a New Type of Threat , 1999, Computer.

[15]  Peter Lonsdale,et al.  Mobile technologies and learning , 2004 .

[16]  Vishrut Sharma An Analytical Survey of Recent Worm Attacks , 2011 .

[17]  David Moore,et al.  Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.

[18]  Karen Mercedes Goertzel Software Survivability: Where Safety and Security Converge , 2009 .

[19]  Donald F. Towsley,et al.  Code red worm propagation modeling and analysis , 2002, CCS '02.

[20]  S. Cass Anatomy of malice [computer viruses] , 2001 .

[21]  Robin A. Gandhi,et al.  Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political , 2011, IEEE Technology and Society Magazine.

[22]  Piotr Bania Evading network-level emulation , 2009, ArXiv.