Classification of cyber attacks in South Africa

Renier Van Heerden, Sune Von Soms, Roderick Mooi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Citations (Scopus)

Abstract

This paper introduces a classification scheme for the visual classification of cyber attacks. Through the use of the scheme, the impact of various cyber attacks throughout the history of South Africa are investigated and classified. The goal of this paper is to introduce a classification scheme that arranges attacks into different classes and sub-classes, which is presented visually. To enhance the visual description, each class has a maximum of three sub-classes, which can overlap. This classification scheme helps to show the diverse impacts of cyber attacks in South Africa. This method of classification can be used for the assessment of any cyber attack and to find similarities between attacks.

Original languageEnglish
Title of host publication2016 IST-Africa Conference, IST-Africa 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781905824557
DOIs
Publication statusPublished - 2 Aug 2016
Event2016 IST-Africa Conference, IST-Africa 2016 - Durban, South Africa
Duration: 11 May 201613 May 2016

Publication series

Name2016 IST-Africa Conference, IST-Africa 2016

Conference

Conference2016 IST-Africa Conference, IST-Africa 2016
Country/TerritorySouth Africa
CityDurban
Period11/05/1613/05/16

Keywords

  • South Africa
  • classification
  • cyber attacks

ASJC Scopus subject areas

  • Sociology and Political Science
  • Computer Networks and Communications
  • Communication

Fingerprint

Dive into the research topics of 'Classification of cyber attacks in South Africa'. Together they form a unique fingerprint.

Cite this