Home > Research > Publications & Outputs > An Analysis of Cyber Security Attack Taxonomies

Links

Text available via DOI:

View graph of relations

An Analysis of Cyber Security Attack Taxonomies

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

An Analysis of Cyber Security Attack Taxonomies. / Derbyshire, Ric; Green, Benjamin; Mauthe, Andreas Ulrich et al.
Workshop on Safety & Security aSSurance for Critical Infrastructures Protection. IEEE, 2018. p. 153-161.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Derbyshire, R, Green, B, Mauthe, AU, Busby, JS & Hutchison, D 2018, An Analysis of Cyber Security Attack Taxonomies. in Workshop on Safety & Security aSSurance for Critical Infrastructures Protection. IEEE, pp. 153-161, Workshop on Safety & Security aSSurance for Critical Infrastructures Protection, London, United Kingdom, 27/04/18. https://doi.org/10.1109/EuroSPW.2018.00028

APA

Derbyshire, R., Green, B., Mauthe, A. U., Busby, J. S., & Hutchison, D. (2018). An Analysis of Cyber Security Attack Taxonomies. In Workshop on Safety & Security aSSurance for Critical Infrastructures Protection (pp. 153-161). IEEE. https://doi.org/10.1109/EuroSPW.2018.00028

Vancouver

Derbyshire R, Green B, Mauthe AU, Busby JS, Hutchison D. An Analysis of Cyber Security Attack Taxonomies. In Workshop on Safety & Security aSSurance for Critical Infrastructures Protection. IEEE. 2018. p. 153-161 doi: 10.1109/EuroSPW.2018.00028

Author

Derbyshire, Ric ; Green, Benjamin ; Mauthe, Andreas Ulrich et al. / An Analysis of Cyber Security Attack Taxonomies. Workshop on Safety & Security aSSurance for Critical Infrastructures Protection. IEEE, 2018. pp. 153-161

Bibtex

@inproceedings{f3d085bdb4f84310bd5b506efcad8bf7,
title = "An Analysis of Cyber Security Attack Taxonomies",
abstract = "Taxonomies have been developed as a mechanism for cyber attack categorisation. However, when one considers the recent and rapid evolution of attacker techniques and targets, the applicability and effectiveness of these taxonomies should be questioned. This paper applies two approaches tothe evaluation of seven taxonomies. The first employs a criteria set, derived through analysis of existing works in which critical components to the creation of taxonomies are defined. Thesecond applies historical attack data to each taxonomy under review, more specifically, attacks in which industrial control systems have been targeted. This combined approach allows for a more in-depth understanding of existing taxonomies to be developed, from both a theoretical and practical perspective.",
author = "Ric Derbyshire and Benjamin Green and Mauthe, {Andreas Ulrich} and Busby, {Jeremy Simon} and David Hutchison",
year = "2018",
month = apr,
day = "27",
doi = "10.1109/EuroSPW.2018.00028",
language = "English",
pages = "153--161",
booktitle = "Workshop on Safety & Security aSSurance for Critical Infrastructures Protection",
publisher = "IEEE",
note = "Workshop on Safety & Security aSSurance for Critical Infrastructures Protection, S4CIP ; Conference date: 27-04-2018",

}

RIS

TY - GEN

T1 - An Analysis of Cyber Security Attack Taxonomies

AU - Derbyshire, Ric

AU - Green, Benjamin

AU - Mauthe, Andreas Ulrich

AU - Busby, Jeremy Simon

AU - Hutchison, David

N1 - Conference code: 3

PY - 2018/4/27

Y1 - 2018/4/27

N2 - Taxonomies have been developed as a mechanism for cyber attack categorisation. However, when one considers the recent and rapid evolution of attacker techniques and targets, the applicability and effectiveness of these taxonomies should be questioned. This paper applies two approaches tothe evaluation of seven taxonomies. The first employs a criteria set, derived through analysis of existing works in which critical components to the creation of taxonomies are defined. Thesecond applies historical attack data to each taxonomy under review, more specifically, attacks in which industrial control systems have been targeted. This combined approach allows for a more in-depth understanding of existing taxonomies to be developed, from both a theoretical and practical perspective.

AB - Taxonomies have been developed as a mechanism for cyber attack categorisation. However, when one considers the recent and rapid evolution of attacker techniques and targets, the applicability and effectiveness of these taxonomies should be questioned. This paper applies two approaches tothe evaluation of seven taxonomies. The first employs a criteria set, derived through analysis of existing works in which critical components to the creation of taxonomies are defined. Thesecond applies historical attack data to each taxonomy under review, more specifically, attacks in which industrial control systems have been targeted. This combined approach allows for a more in-depth understanding of existing taxonomies to be developed, from both a theoretical and practical perspective.

U2 - 10.1109/EuroSPW.2018.00028

DO - 10.1109/EuroSPW.2018.00028

M3 - Conference contribution/Paper

SP - 153

EP - 161

BT - Workshop on Safety & Security aSSurance for Critical Infrastructures Protection

PB - IEEE

T2 - Workshop on Safety & Security aSSurance for Critical Infrastructures Protection

Y2 - 27 April 2018

ER -