A Computer Network Attack Taxonomy and Ontology

Copyright: 2012 IGI Global. This is an pre/post print version of the work. The definitive version is published in International Journal of Cyber Warfare and Terrorism, vol. 2(3), pp 12-25

[1]  Minjie Zhang,et al.  P2P Distributed Intrusion Detections by Using Mobile Agents , 2008, Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008).

[2]  Julie A. Dickerson,et al.  Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).

[3]  Peter Reiher,et al.  A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.

[4]  Stuart Harvey Rubin,et al.  Distributed denial of service attacks , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[5]  Ruby B. Lee,et al.  Remote Denial of Service Attacks and Countermeasures , 2001 .

[6]  Raphael Mudge Live-fire security testing with Armitage and Metasploit , 2011 .

[7]  Ruby B. Lee,et al.  Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures , 2004, PDCS.

[8]  Heloise Pieterse,et al.  Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model , 2012, HCC.

[9]  Lisa Lancor,et al.  Using google hacking to enhance defense strategies , 2007, SIGCSE '07.

[10]  Erland Jonsson,et al.  How to systematically classify computer security intrusions , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[11]  Susan W. Brenner,et al.  State-Sponsored Crime: The Futility of the Economic Espionage Act , 2006 .

[12]  Andrew James Simmonds,et al.  An Ontology for Network Security Attacks , 2004, AACC.

[13]  Jack Valentin,et al.  News of the world , 2000 .

[14]  Kim-Kwang Raymond Choo Organised crime groups in cyberspace: a typology , 2008 .

[15]  N. F. Noy,et al.  Ontology Development 101: A Guide to Creating Your First Ontology , 2001 .

[16]  Raducanu Razvan Over the SQL injection hacking method , 2009, ICC 2009.

[17]  Steven Furnell,et al.  Insider Threat Prediction Tool: Evaluating the probability of IT misuse , 2002, Comput. Secur..

[18]  Timothy W. Finin,et al.  A Target-Centric Ontology for Intrusion Detection , 2003, IJCAI 2003.

[19]  Calton Pu,et al.  Buffer overflows: attacks and defenses for the vulnerability of the decade , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[20]  M. Mignone,et al.  THE FOX AND THE HUNTERS: HOW IC TECHNOLOGIES CHANGE THE CRIME RACE* , 2002 .

[21]  Thomas R. Gruber,et al.  A translation approach to portable ontology specifications , 1993, Knowl. Acquis..

[22]  James A. Lewis Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats , 2002 .

[23]  David R. Cheriton,et al.  Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks , 2003, ArXiv.

[24]  Robin A. Gandhi,et al.  Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political , 2011, IEEE Technology and Society Magazine.

[25]  Mark Rounds,et al.  Diversity in Network Attacker Motivation: A Literature Review , 2009, 2009 International Conference on Computational Science and Engineering.

[26]  Marc Dacier,et al.  Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.

[27]  Jan H. P. Eloff,et al.  Simulating adversarial interactions between intruders and system administrators using OODA-RR , 2007, SAICSIT '07.

[28]  Nicholas H. Brummell,et al.  Dynamo efficiency in compressible convective dynamos with and without penetration , 2010 .

[29]  Simon Luke Hansman,et al.  A Taxonomy of Network and Computer Attack Methodologies , 2003 .