Comprehensive Security Integrated Model and Ontology within Cloud Computing

被引:9
作者
Liu, Fong-Hao [1 ]
Lo, Hsiang-Fu [2 ]
Chen, Liang-Chu [1 ]
Lee, Wei-Tsong [2 ]
机构
[1] Natl Def Univ, Coll Management, Dept Informat Management, Taipei, Taiwan
[2] Tamkang Univ, Dept Elect Engn, Taipei, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2013年 / 14卷 / 06期
关键词
Cloud computing; Knowledge base; Ontology; Knowledge engineering; Network attack classification; SYSTEM; MANAGEMENT; ATTACKS;
D O I
10.6138/JIT.2013.14.6.08
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that bring up various security threats. They are extreme new, innumerous and mutational. Partial and fragmented network security knowledge is usually provided by traditional computer security systems, including IDS, anti-virus system, etc., and direct knowledge query of web search engines. However, they are unable to provide users with the comprehensive knowledge and rapid reaction solutions. Users are consequently hard to clarify the causes and consequences of network security problems. A Comprehensive Security Integrated (CSI) model with acquisition, storing, reusing and integration of network security knowledge for cloud computing is proposed to help understand and trace the suspicious network attack threats and origins. Also, several knowledge classes (frames) are constructed in the implementation for knowledge query and manipulation. The process of CSI model and how it provides the comprehensive knowledge for problem solving are then explained by demonstration cases. Moreover, the demonstration results indicate that the CSI model and the implementation are more efficient than traditional fragmented knowledge from web search.
引用
收藏
页码:935 / 945
页数:11
相关论文
共 28 条
[1]  
Alberts L. K., 1993, THESIS U TWENTE AE E
[2]   A new taxonomy of Web attacks suitable for efficient encoding [J].
Alvarez, G ;
Petrovic, S .
COMPUTERS & SECURITY, 2003, 22 (05) :435-449
[3]  
[Anonymous], 2001, KSL0105
[4]  
Brinkley D.L., 1995, Information security: An integrated collection of essays, P11
[5]   What are ontologies, and why do we need them? [J].
Chandrasekaran, B ;
Josephson, JR ;
Benjamins, VR .
IEEE INTELLIGENT SYSTEMS & THEIR APPLICATIONS, 1999, 14 (01) :20-26
[6]  
Chang Chih-Ching, 2000, NETWORK MAGAZINE TAI
[7]   On-Demand Security Architecture for Cloud Computing [J].
Chen, Jianyong ;
Wang, Yang ;
Wang, Xiaomin .
COMPUTER, 2012, 45 (07) :73-78
[8]  
Cho JH, 2012, J INTERNET TECHNOL, V13, P509
[9]   An Ontology-driven Model for Digital Forensics Investigations of Computer Incidents under the Ubiquitous Computing Environments [J].
Chu, Hai-Cheng ;
Deng, Der-Jiunn ;
Chao, Han-Chieh .
WIRELESS PERSONAL COMMUNICATIONS, 2011, 56 (01) :5-19
[10]   Information system defences: A preliminary classification scheme [J].
Cohen, F .
COMPUTERS & SECURITY, 1997, 16 (02) :94-114