Abstract
This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The Attack stage is separated into: Ramp-up, Damage and Residue. This paper demonstrates how our eight significant hacking events are mapped to the temporal computer attack model. The temporal computer attack model becomes a valuable asset in the protection of critical infrastructure by being able to detect similar attacks earlier.
Keywords
References
Heater, B.: Male: A Brief Timeline (2011), http://www.pcmag.com/slideshow/story/261678/malware-a-brief-timeline/
Hall, K.: The 7 worstcyberattacks in history (that we know about) (2012), http://dvice.com/archives/2010/09/7-of-the-most-d.php
Julian: 10 Most Costly Cyber Attacks in History (2011), http://www.businesspundit.com/10-most-costly-cyber-attacks-in-history/
van Heerden, R.P., Irwin, B., Burke, I.D.: Classifying Network Attack Scenarios using an Ontology. In: Proceedings of the 7th International Conference on Information Warfare and Security, pp. 331–324 (2012)
Desai, P.: Towards an undetectable computer virus. Master’s thesis, San Jose State University (2008), http://www.cs.sjsu.edu/faculty/stamp/students/Desai_Priti.pdf
Subramanya, S.R., Lakshminarasimhan, N.: Computer viruses. IEEE Potential 20(4), 16–19 (2001)
Blümler, P.: I-LOVE-YOU: Viruses. Trojan Horses and Worms, http://www.econmr.org/datapool/page/30/virus.pdf
Orman, H.: The Morris worm: a fifteen-year perspective. IEEE Security & Privacy 1(5), 35–43 (2003)
Chen, T.M., Robert, J.M.: Worm epidemics in high-speed networks. Computer 37(6), 48–53 (2004)
Cass, S.: Anatomy of malice (computer viruses). IEEE Spectrum 38(11), 56–60 (2004)
Bosworth, S., Kabay, M.E.: Computer security handbook. John Wiley & Sons Inc., New York (2002)
Bishop, M.: Analysis of the I LOVE YOU Worm (2000), http://nob.cs.ucdavis.edu/classes/ecs155-2005-04/handouts/iloveyou.pdf
Moore, D., Shannon, C.: Code-Red: a case study on the spread and victims of an Internet worm. In: Proceedings of the 2nd ACMSIGCOMM Workshop on Internet Measurement, pp. 273–284. ACM (2002)
Zou, C.C., Gong, W., Towsley, D.: Code red worm propagation modeling and analysis. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 138–147. ACM (2002)
Sarwar, U., Ramadass, S., Budiarto, R.: Dawn Of The Mobile Malware: Reviewing Mobile Worms. In: Proceedings of the 4th International Conference on Sciences of Electronic, Technologies of Information and Telecommunications (SETIT 2007), pp. 35–39 (2007)
Czosseck, C., Ottis, R., Taliharm, A.M.: Estonia after the 2007 Cyber Attacks: Legal, Strategic and Organisational Changes in Cyber Security. International Journal of Cyber Warfare and Terrorism (IJCWT) 1(1), 24–34 (2011)
Davis, J.: Hackers Take Down the Most Wired Country in Europe. Wired Magazine 9(15) (2007)
Sharma, V.: An Analytical Survey of Recent Worm Attacks. IJCSNS 11(11), 99–103 (2011)
Falliere, N., Murchu, L.O., Chien, E.: W32.stuxnet dossier: version 1.4, White paper, Symantec Corp. Security Response (2011), http://www.wired.com/images_blogs/threatlevel/2011/02/Symantec-Stuxnet-Update-Feb-2011.pdf
Bradley, F.: Critical infrastructure protection. Electric Energy T and D 7(2), 4–6 (2003)
Tsang, S.: Cyberthreats, Vulnerabilities and Attacks on SCADA Networks (2009), http://gspp.berkeley.edu/iths/TsangSCADA20Attacks.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
van Heerden, R., Pieterse, H., Irwin, B. (2012). Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model. In: Hercheui, M.D., Whitehouse, D., McIver, W., Phahlamohlaka, J. (eds) ICT Critical Infrastructures and Society. HCC 2012. IFIP Advances in Information and Communication Technology, vol 386. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33332-3_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-33332-3_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33331-6
Online ISBN: 978-3-642-33332-3
eBook Packages: Computer ScienceComputer Science (R0)