Ontology Based Approach for Perception of Network Security State

被引:0
|
作者
Bhandari, Pardeep [1 ]
Gujral, Manpreet Singh [2 ]
机构
[1] Doaba Coll, Jalandhar, Punjab, India
[2] Punjabi Univ, Patiala, Punjab, India
来源
2014 RECENT ADVANCES IN ENGINEERING AND COMPUTATIONAL SCIENCES (RAECS) | 2014年
关键词
Network Security Status; Ontology; Network Situational awareness; Taxonomy; ATTACKS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents an ontological approach to perceive the current security status of the network. Computer network is a dynamic entity whose state changes with the introduction of new services, installation of new network operating system, and addition of new hardware components, creation of new user roles and by attacks from various actors instigated by aggressors. Various security mechanisms employed in the network does not give the complete picture of security of complete network. In this paper we have proposed taxonomy and ontology which may be used to infer impact of various events happening in the network on security status of the network. Vulnerability, Network and Attack are the main taxonomy classes in the ontology. Vulnerability class describes various types of vulnerabilities in the network which may in hardware components like storage devices, computing devices or networks devices. Attack class has many subclasses like Actor class which is entity executing the attack, Goal class describes goal of the attack, Attack mechanism class defines attack methodology, Scope class describes size and utility of the target, Automation level describes the automation level of the attack Evaluation of security status of the network is required for network security situational awareness. Network class has network operating system, users, roles, hardware components and services as its subclasses. Based on this taxonomy ontology has been developed to perceive network security status. Finally a framework, which uses this ontology as knowledgebase has been proposed.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Ontology Based Approach for Network Security
    Arunadevi, M.
    Perumal, K. S.
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2016, : 573 - 578
  • [2] An Ontology Based Approach to Information Security
    Pereira, Teresa
    Santos, Henrique
    METADATA AND SEMANTIC RESEARCH, PROCEEDINGS, 2009, 46 : 183 - 192
  • [3] Ontology-based model of network and computer attacks for security assessment
    Gao J.-B.
    Zhang B.-W.
    Chen X.-H.
    Luo Z.
    Journal of Shanghai Jiaotong University (Science), 1600, Shanghai Jiaotong University (18): : 554 - 562
  • [4] Ontology-Based Model of Network and Computer Attacks for Security Assessment
    高建波
    张保稳
    陈晓桦
    罗铮
    Journal of Shanghai Jiaotong University(Science), 2013, 18 (05) : 554 - 562
  • [5] The Semantic Approach to Cyber Security Towards Ontology Based Body of Knowledge
    Aviad, Adiel
    Wecel, Krzysztof
    Abramowicz, Witold
    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 328 - 336
  • [6] An Ontology-Centric Approach for Network Security Situation Awareness
    Wang, Yixuan
    Zhao, Bo
    Li, Weidong
    Zhu, Lingzi
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 777 - 787
  • [7] An ontology for network security attacks
    Simmonds, A
    Sandilands, P
    van Ekert, L
    APPLIED COMPUTING, PROCEEDINGS, 2004, 3285 : 317 - 323
  • [8] An Ontology-based Approach to Security Pattern Selection
    Guan, Hui
    Yang, Hongji
    Wang, Jun
    INTERNATIONAL JOURNAL OF AUTOMATION AND COMPUTING, 2016, 13 (02) : 168 - 182
  • [9] An Ontology-based Approach to Security Pattern Selection
    Hui Guan
    Hongji Yang
    Jun Wang
    International Journal of Automation and Computing, 2016, 13 (02) : 168 - 182
  • [10] Network security situation elements fusion method based on ontology
    Si, Cheng
    Zhang, Hongqi
    Wang, Yongwei
    Liu, Jiang
    2014 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2014), VOL 2, 2014,