Security Data Mining in an Ontology for Vulnerability Management

被引:15
作者
Wang, Ju An [1 ]
Guo, Minzhe [1 ]
机构
[1] So Polytech State Univ, Sch Comp & Software Engn, Marietta, GA 30060 USA
来源
2009 INTERNATIONAL JOINT CONFERENCE ON BIOINFORMATICS, SYSTEMS BIOLOGY AND INTELLIGENT COMPUTING, PROCEEDINGS | 2009年
关键词
Software vulnerabilities; Information security; Measurement; Semantic technology; Ontology; TAXONOMY;
D O I
10.1109/IJCBS.2009.13
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information security is such a complex topic that the sheer scope and volume of available security data overwhelms security professionals and managers alike. This paper discusses the rationale of applying semantic technology to information security with a focus on software vulnerability management. With semantic technologies, we can describe the pattern of external threats and internal vulnerabilities formally and precisely. Based on this, we can make inference and make high-level decisions accordingly. We have constructed an ontology for security vulnerabilities, which defines the key concepts in vulnerability management and their relationships. We introduce the design and reasoning within the ontology with examples in vulnerability analysis and assessment. The result of this paper provides a promising pathway to making security automation successful through semantic technologies.
引用
收藏
页码:597 / 603
页数:7
相关论文
共 52 条
[1]  
[Anonymous], P 3 INT C AV REL SEC
[2]  
[Anonymous], 2007, 1 FORUM INCIDENT RES
[3]  
[Anonymous], 2003, DESCRIPTION LOGIC HD
[4]  
[Anonymous], P 41 HAW INT C SYST
[5]  
[Anonymous], 1994, Fundamentals of Computer Security Technology
[6]  
[Anonymous], JESS, the Rule Engine for the Java platform
[7]  
[Anonymous], PELLET OPEN SOURCE O
[8]   Basic concepts and taxonomy of dependable and secure computing [J].
Avizienis, A ;
Laprie, JC ;
Randell, B ;
Landwehr, C .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (01) :11-33
[9]  
Babbin J., 2006, SECURITY LOG MANAGEM
[10]  
BAO J, PRIVACY PRESERVING R