Pub Date : 2013-11-01DOI: 10.1109/ICASTECH.2013.6707517
A. Adesemowo, Kerry Thompson
With the advent of Big Data and strategic investment into complex best-in-breed Governance, Risk, Compliance initiative, and the imminent introduction of Protection of Personal Information Bill in South Africa, are organizations in control of Information Technology Asset throughout its useful life. We look at oversight over IT Asset interface with IT Service Desk support function. Intruders like flowing water will explore the weakest opening much like a chain with the weakest link. In so far sound an organization's information security and internal controls are; it takes just the non-effectiveness or non-existence of a control, such as during IT Asset disposal for a vulnerability to be exploited and a breach to occur. This paper illustrates our finding from forensic analysis of a disposed IT Asset and discovered that we are far from improper disposal and its attendant risk. In actual fact, we are able to link improper disposal to lack of integration between IT Service Desk and IT Asset Disposal. We conclude by outlining considerations an organization should consider in integrating IT asset disposal with IT service desk.
随着大数据的出现和对复杂的最佳治理、风险、合规计划的战略投资,以及南非即将出台的《个人信息保护法案》,在信息技术资产的整个使用寿命中,组织都在控制着信息技术资产。我们着眼于对IT资产接口与IT服务台支持功能的监督。像流水一样的入侵者会探索最薄弱的开口,就像一条带有最薄弱环节的链条。到目前为止,一个组织的信息安全和内部控制是健全的;它只需要控制无效或不存在,例如在it资产处置期间,就可以利用漏洞并发生破坏。本文阐述了我们对处置的IT资产进行法医学分析的发现,并发现我们远离了不当处置及其伴随的风险。实际上,我们能够将不当的处理与IT Service Desk和IT Asset disposal之间缺乏集成联系起来。最后,我们概述了组织在将IT资产处置与IT服务台集成时应该考虑的事项。
{"title":"Service desk link into IT asset disposal: A case of a discarded IT asset","authors":"A. Adesemowo, Kerry Thompson","doi":"10.1109/ICASTECH.2013.6707517","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707517","url":null,"abstract":"With the advent of Big Data and strategic investment into complex best-in-breed Governance, Risk, Compliance initiative, and the imminent introduction of Protection of Personal Information Bill in South Africa, are organizations in control of Information Technology Asset throughout its useful life. We look at oversight over IT Asset interface with IT Service Desk support function. Intruders like flowing water will explore the weakest opening much like a chain with the weakest link. In so far sound an organization's information security and internal controls are; it takes just the non-effectiveness or non-existence of a control, such as during IT Asset disposal for a vulnerability to be exploited and a breach to occur. This paper illustrates our finding from forensic analysis of a disposed IT Asset and discovered that we are far from improper disposal and its attendant risk. In actual fact, we are able to link improper disposal to lack of integration between IT Service Desk and IT Asset Disposal. We conclude by outlining considerations an organization should consider in integrating IT asset disposal with IT service desk.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115720046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICASTECH.2013.6707508
R. Oosthuizen, L. Pretorius
Systems Engineering techniques and approaches are applied to design and develop solutions for complex problems. Information and Communication Technology systems can be complex to develop where the impact of new technology is not always understood as humans can apply them different than intended. This necessitates the application of a Sociotechnical System framework to analyze the possible impact of a new technology. A rigorous and valid experimentation approach is required to analyze system behaviors in support of Systems Engineering efforts, which is difficult with complex Sociotechnical Systems. Cognitive Work Analysis and System Dynamics are two complementary approaches that can be applied within this context. The products of these methods assist in defining the hypothesis required for experimenting with the new technology.
{"title":"An analysis methodology for impact of new technology in complex sociotechnical systems","authors":"R. Oosthuizen, L. Pretorius","doi":"10.1109/ICASTECH.2013.6707508","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707508","url":null,"abstract":"Systems Engineering techniques and approaches are applied to design and develop solutions for complex problems. Information and Communication Technology systems can be complex to develop where the impact of new technology is not always understood as humans can apply them different than intended. This necessitates the application of a Sociotechnical System framework to analyze the possible impact of a new technology. A rigorous and valid experimentation approach is required to analyze system behaviors in support of Systems Engineering efforts, which is difficult with complex Sociotechnical Systems. Cognitive Work Analysis and System Dynamics are two complementary approaches that can be applied within this context. The products of these methods assist in defining the hypothesis required for experimenting with the new technology.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114163133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICASTECH.2013.6707505
L. Nkosi, Paul Tarwireyi, M. Adigun
Cloud computing is a growing paradigm that offers a lot of benefits to cloud users. Despite the potential benefits that cloud computing could offer to business and individuals, security remains one of the growing concerns that are hindering the adoption of this paradigm. Researchers have identified and dealt with many security threats to cloud computing. However, insider threats still remain as one of the major concerns. Threats from malicious insiders are often listed as dangerous threats by many researchers. However, this threat has not received the attention it deserves because many organizations turn out to be extra careful about external threats than insider threats. This paper discusses an approach that can help in identifying insiders behaving in a malicious way, which may lead to an attack. A rule learning algorithm was used in learning the behavior pattern of users, in order to build user profiles. A Matching algorithm was then used to match the historical behavior of the user with the current behavior, in order to identify users that masquerade in the system as normal users. The obtained results show that it was possible to identify insiders that masquerade in the system by observing their behavior patterns.
{"title":"Detecting a malicious insider in the cloud environment using sequential rule mining","authors":"L. Nkosi, Paul Tarwireyi, M. Adigun","doi":"10.1109/ICASTECH.2013.6707505","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707505","url":null,"abstract":"Cloud computing is a growing paradigm that offers a lot of benefits to cloud users. Despite the potential benefits that cloud computing could offer to business and individuals, security remains one of the growing concerns that are hindering the adoption of this paradigm. Researchers have identified and dealt with many security threats to cloud computing. However, insider threats still remain as one of the major concerns. Threats from malicious insiders are often listed as dangerous threats by many researchers. However, this threat has not received the attention it deserves because many organizations turn out to be extra careful about external threats than insider threats. This paper discusses an approach that can help in identifying insiders behaving in a malicious way, which may lead to an attack. A rule learning algorithm was used in learning the behavior pattern of users, in order to build user profiles. A Matching algorithm was then used to match the historical behavior of the user with the current behavior, in order to identify users that masquerade in the system as normal users. The obtained results show that it was possible to identify insiders that masquerade in the system by observing their behavior patterns.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128193952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICASTECH.2013.6707496
Q. Kester, Laurent Nana, A. Pascu
In today's world where drones play a major role in military warfare and domestic surveillance activities, there is a need for transmission of secured video images without any intrusion by a third party. Any intrusion by an adversary should easily be detected in real-time and the compromised information should be virtually impossible to decipher. This paper proposed a new method of encryption of video images using quantum key distribution and visual cryptographic technique. The key agreement process was done using quantum key distribution and the generated key was be used by the proposed encryption algorithm.
{"title":"A novel cryptographic encryption technique of video images using quantum cryptography for satellite communications","authors":"Q. Kester, Laurent Nana, A. Pascu","doi":"10.1109/ICASTECH.2013.6707496","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707496","url":null,"abstract":"In today's world where drones play a major role in military warfare and domestic surveillance activities, there is a need for transmission of secured video images without any intrusion by a third party. Any intrusion by an adversary should easily be detected in real-time and the compromised information should be virtually impossible to decipher. This paper proposed a new method of encryption of video images using quantum key distribution and visual cryptographic technique. The key agreement process was done using quantum key distribution and the generated key was be used by the proposed encryption algorithm.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124658836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICASTECH.2013.6707487
H. Adebanjo, J. Tapamo
We propose a novel Semi Supervised Local Embedding (SSLE) method for feature extraction from hyperspectral data. The proposed method combines a supervised method (Linear Discriminant Analysis (LDA)) and an unsupervised method (Local Linear Embedding (LLE)). The underlying idea is to get the Principal Components (PC) from the original data and input training samples from the principal components into LLE, LDA and into our proposed SSLE algorithm. Thereafter, Support Vetctor Machine (SVM) was used for classification. The overall accuracy of this new algorithm is then compared with other existing semi-supervised algorithms. Experiments on hyperspectral image show the efficacy of the proposed algorithm.
{"title":"Semi-supervised local feature extraction of hyperspectral images over urban areas","authors":"H. Adebanjo, J. Tapamo","doi":"10.1109/ICASTECH.2013.6707487","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707487","url":null,"abstract":"We propose a novel Semi Supervised Local Embedding (SSLE) method for feature extraction from hyperspectral data. The proposed method combines a supervised method (Linear Discriminant Analysis (LDA)) and an unsupervised method (Local Linear Embedding (LLE)). The underlying idea is to get the Principal Components (PC) from the original data and input training samples from the principal components into LLE, LDA and into our proposed SSLE algorithm. Thereafter, Support Vetctor Machine (SVM) was used for classification. The overall accuracy of this new algorithm is then compared with other existing semi-supervised algorithms. Experiments on hyperspectral image show the efficacy of the proposed algorithm.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114995725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICASTECH.2013.6707500
Mischa Koedderitzsch, A. Botha, M. Herselman, A. Coleman
The objective of this paper is to motivate the development of a Channel-Agnostic Mobile Transaction Platform to support drug adherence in a resource constrained environment, review relevant, existing literature in the areas of ICT4D, mHealth for development, and interventions to improve drug adherence, and propose a Design Science Research approach for the development of the platform. One of the main requirements for the utility of a Channel-Agnostic Mobile Transaction Platform is a high adaptation of mobile cellular technology and e-readiness of the audience, which holds true in South Africa. The platform will address the shortcomings of existing ICT solutions and will support services and transactions over multiple mobile channels to accommodate a variety of device capabilities and patients' preferences.
{"title":"Towards a channel-agnostic mobile transaction platform to support drug adherence within a resource constrained environment","authors":"Mischa Koedderitzsch, A. Botha, M. Herselman, A. Coleman","doi":"10.1109/ICASTECH.2013.6707500","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707500","url":null,"abstract":"The objective of this paper is to motivate the development of a Channel-Agnostic Mobile Transaction Platform to support drug adherence in a resource constrained environment, review relevant, existing literature in the areas of ICT4D, mHealth for development, and interventions to improve drug adherence, and propose a Design Science Research approach for the development of the platform. One of the main requirements for the utility of a Channel-Agnostic Mobile Transaction Platform is a high adaptation of mobile cellular technology and e-readiness of the audience, which holds true in South Africa. The platform will address the shortcomings of existing ICT solutions and will support services and transactions over multiple mobile channels to accommodate a variety of device capabilities and patients' preferences.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125798610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICASTECH.2013.6707494
Coral Featherstone
Could Social Media, and in particular, microblogs such as Twitter, play a part in helping to track criminal movement? The aim of this paper is to narrow the focus of this broader problem of using social media to crowdsource information to assist in the fight against crime, to the specific problem of identifying the description of vehicles in microblog text. As this problem has many aspects, especially in terms of data gathering and identification, an initial search is performed on preset keywords and the resulting database is tagged. The tags are then analysed to determine which features are the most common. Topic models are then run on the data to determine if any useful keyword can be found for further searches and initial statistics are recorded as a baseline for further processing. Our primary concern is establishing the common content of the relevant Tweets. The result could be used both for help with data collection as well as with feature selection when learning classification algorithms for data mining.
{"title":"Identifying vehicle descriptions in microblogging text with the aim of reducing or predicting crime","authors":"Coral Featherstone","doi":"10.1109/ICASTECH.2013.6707494","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707494","url":null,"abstract":"Could Social Media, and in particular, microblogs such as Twitter, play a part in helping to track criminal movement? The aim of this paper is to narrow the focus of this broader problem of using social media to crowdsource information to assist in the fight against crime, to the specific problem of identifying the description of vehicles in microblog text. As this problem has many aspects, especially in terms of data gathering and identification, an initial search is performed on preset keywords and the resulting database is tagged. The tags are then analysed to determine which features are the most common. Topic models are then run on the data to determine if any useful keyword can be found for further searches and initial statistics are recorded as a baseline for further processing. Our primary concern is establishing the common content of the relevant Tweets. The result could be used both for help with data collection as well as with feature selection when learning classification algorithms for data mining.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121340391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICASTECH.2013.6707504
P. Matyila, A. Botha, R. Alberts, G. Sibiya
The purpose of this paper is to assert that there is a need to design mobile services that are accessible and usable to low literacy user groups. There is currently an abundant availability of mobile phones supporting mobile services in the general population. However low literacy user groups have limited or no access to these mobile services. One of the challenges affecting access by these users is text and numeric intensity inherent in current mobile applications. Visual interfaces in terms of icons and widgets can provide a solution by minimizing the text intensity of the resulting mobile applications in support of mobile services. The standardization of the design of mobile applications geared for low literacy user groups is incomplete and poses challenges to the design community. Designing a sample mobile application satisfying the needs of low literacy users groups can form a working template which can facilitate the standardization process of mobile services for low literacy user groups. User centered approaches in the design of such an application are necessary for underpinning the needs of low literacy users. Further, a research approach supporting the creation of innovative artifacts enables variety in terms of the building blocks for providing a solution for the research problem. The design science research approach facilitates this requirement and further provides the necessary grounding for the research and as such it is adopted in the research process.
{"title":"The design of accessible and usable mobile services for low literate users","authors":"P. Matyila, A. Botha, R. Alberts, G. Sibiya","doi":"10.1109/ICASTECH.2013.6707504","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707504","url":null,"abstract":"The purpose of this paper is to assert that there is a need to design mobile services that are accessible and usable to low literacy user groups. There is currently an abundant availability of mobile phones supporting mobile services in the general population. However low literacy user groups have limited or no access to these mobile services. One of the challenges affecting access by these users is text and numeric intensity inherent in current mobile applications. Visual interfaces in terms of icons and widgets can provide a solution by minimizing the text intensity of the resulting mobile applications in support of mobile services. The standardization of the design of mobile applications geared for low literacy user groups is incomplete and poses challenges to the design community. Designing a sample mobile application satisfying the needs of low literacy users groups can form a working template which can facilitate the standardization process of mobile services for low literacy user groups. User centered approaches in the design of such an application are necessary for underpinning the needs of low literacy users. Further, a research approach supporting the creation of innovative artifacts enables variety in terms of the building blocks for providing a solution for the research problem. The design science research approach facilitates this requirement and further provides the necessary grounding for the research and as such it is adopted in the research process.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122989195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICASTECH.2013.6707501
L. Leenen, A. Terlunen
The Military Unit Path Finding Problem (MUPFP) is the problem of finding a path from a starting point to a destination where a military unit has to move, or be moved, safely whilst avoiding threats and obstacles and minimising path cost in some digital representation of the actual terrain [1]. The MUPFP has to be solved in an environment where information can change whilst the optimal path is being calculated, i.e. obstacles and threats can move or appear and path costs can change. In previous work, the authors formulated the MUPFP as a constraint satisfaction problem (CSP) where path costs are minimised whilst threat and obstacle avoidance constraints are satisfied in a dynamic environment [2]. In this paper the previous algorithm is improved by adding a heuristic to focus the search for an optimal path. Existing approaches to solving path planning problems tend to combine path costs with various other criteria such as obstacle avoidance in the objective function which is being optimised. The authors' approach is to optimise only path costs while ensuring that other criteria such as safety requirements, are met through the satisfaction of added constraints. Both the authors' previous algorithm and the improved version presented in this paper are based on dynamic path planning algorithms presented by Stenz [3], [4]. Stenz's original D* algorithm solves dynamic path finding problems (by optimising path costs without satisfying additional constraints) and his Focussed D* algorithm employs a heuristic function to focus the search. Stenz's algorithms only optimises path costs; no additional factors such as threat and obstacle avoidance are addressed.
{"title":"A focussed dynamic path finding algorithm with constraints","authors":"L. Leenen, A. Terlunen","doi":"10.1109/ICASTECH.2013.6707501","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707501","url":null,"abstract":"The Military Unit Path Finding Problem (MUPFP) is the problem of finding a path from a starting point to a destination where a military unit has to move, or be moved, safely whilst avoiding threats and obstacles and minimising path cost in some digital representation of the actual terrain [1]. The MUPFP has to be solved in an environment where information can change whilst the optimal path is being calculated, i.e. obstacles and threats can move or appear and path costs can change. In previous work, the authors formulated the MUPFP as a constraint satisfaction problem (CSP) where path costs are minimised whilst threat and obstacle avoidance constraints are satisfied in a dynamic environment [2]. In this paper the previous algorithm is improved by adding a heuristic to focus the search for an optimal path. Existing approaches to solving path planning problems tend to combine path costs with various other criteria such as obstacle avoidance in the objective function which is being optimised. The authors' approach is to optimise only path costs while ensuring that other criteria such as safety requirements, are met through the satisfaction of added constraints. Both the authors' previous algorithm and the improved version presented in this paper are based on dynamic path planning algorithms presented by Stenz [3], [4]. Stenz's original D* algorithm solves dynamic path finding problems (by optimising path costs without satisfying additional constraints) and his Focussed D* algorithm employs a heuristic function to focus the search. Stenz's algorithms only optimises path costs; no additional factors such as threat and obstacle avoidance are addressed.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132652147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICASTECH.2013.6707510
Renier van Heerden, L. Leenen, B. Irwin
In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes and inter-class relationships and has previously been implemented in the Protege ontology editor. Two significant recent instances of network based attacks are presented as individuals in the ontology and correctly classified by the automated reasoner according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank in 2012.
{"title":"Automated classification of computer network attacks","authors":"Renier van Heerden, L. Leenen, B. Irwin","doi":"10.1109/ICASTECH.2013.6707510","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707510","url":null,"abstract":"In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes and inter-class relationships and has previously been implemented in the Protege ontology editor. Two significant recent instances of network based attacks are presented as individuals in the ontology and correctly classified by the automated reasoner according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank in 2012.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121153759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}