An ontology-based approach to react to network attacks

被引:6
|
作者
Cuppens-Boulahia, Nora [1 ]
Cuppens, Frederic [1 ]
Lopez de Vergara, Jorge E. [2 ]
Vazquez, Enrique [3 ]
Guerra, Javier [3 ]
Debar, Herve [4 ]
机构
[1] TELECOM Bretagne, Cesson Sevigne, France
[2] Univ Autonoma Madrid, Madrid, Spain
[3] Univ Politecn Madrid, Madrid, Spain
[4] France Telecom, Caen, France
关键词
Attack reaction; policy instantiation; ontology; OrBAC; IDMEF; OWL; SWRL;
D O I
10.1109/CRISIS.2008.4757461
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To address the evolution of security incidents in current communication networks it is important to react quickly and efficiently to an attack. The RED (Reaction after Defection) project is defining and designing solutions to enhance the detection/reaction process, improving the overall resilience of IP networks to attacks and help telecommunication and service providers to maintain sufficient quality of service and respect service level agreements. Within this project, a main component is in charge of instantiating new security policies that counteract the network-attacks. This paper proposes an ontology-based approach to instantiate these security policies. This technology provides a way to map alerts into attack contexts, which are used to identify the policies to be applied in the network to solve the threat. For this, ontologies to describe alerts and policies are defined. using inference rules to perform such mappings.
引用
收藏
页码:27 / +
页数:2
相关论文
共 50 条
  • [1] Security policy instantiation to react to network attacks -: An ontology-based approach using OWL and SWRL
    Lopez de Vergara, Jorge E.
    Vazquez, Enrique
    Guerra, Javier
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 78 - +
  • [2] An Ontology-Based System to Identify Complex Network Attacks
    Frye, Lisa
    Cheng, Liang
    Heflin, Jeff
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012, : 6683 - 6688
  • [3] Ontology-based model of network and computer attacks for security assessment
    Gao J.-B.
    Zhang B.-W.
    Chen X.-H.
    Luo Z.
    Journal of Shanghai Jiaotong University (Science), 1600, Shanghai Jiaotong University (18): : 554 - 562
  • [4] Ontology-Based Model of Network and Computer Attacks for Security Assessment
    高建波
    张保稳
    陈晓桦
    罗铮
    JournalofShanghaiJiaotongUniversity(Science), 2013, 18 (05) : 554 - 562
  • [5] Ontology-Based Network Planning
    Umar, Amjad
    Subbaraman, Ramesh
    INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2008, 4 (03) : 31 - 51
  • [6] EXPERTS SEARCH AND RANK WITH SOCIAL NETWORK: AN ONTOLOGY-BASED APPROACH
    Uddin, Mohammed Nazim
    Trong Hai Duong
    Oh, Kyeong-Jin
    Jung, Jin-Guk
    Jo, Geun-Sik
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2013, 23 (01) : 31 - 50
  • [7] An ontology-based approach for harmonizing metrics in bike network evaluations
    Grisiute, Ayda
    Wiedemann, Nina
    Herthogs, Pieter
    Raubal, Martin
    COMPUTERS ENVIRONMENT AND URBAN SYSTEMS, 2024, 113
  • [8] A user-oriented ontology-based approach for network intrusion detection
    Hung, Shao-Shin
    Liu, Damon Shing-Min
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (1-2) : 78 - 88
  • [9] Ontology-based Approach for Cybersecurity Recruitment
    Maroun, Mario
    Ivanova, Antonina
    APPLICATIONS OF MATHEMATICS IN ENGINEERING AND ECONOMICS (AMEE20), 2021, 2333
  • [10] Ontology-based semantic matchmaking approach
    Shu, Gao
    Rana, Omer F.
    Avis, Nick J.
    Chen, Dingfang
    ADVANCES IN ENGINEERING SOFTWARE, 2007, 38 (01) : 59 - 67