Ontology Based Approach for Perception of Network Security State

被引:0
作者
Bhandari, Pardeep [1 ]
Gujral, Manpreet Singh [2 ]
机构
[1] Doaba Coll, Jalandhar, Punjab, India
[2] Punjabi Univ, Patiala, Punjab, India
来源
2014 RECENT ADVANCES IN ENGINEERING AND COMPUTATIONAL SCIENCES (RAECS) | 2014年
关键词
Network Security Status; Ontology; Network Situational awareness; Taxonomy; ATTACKS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents an ontological approach to perceive the current security status of the network. Computer network is a dynamic entity whose state changes with the introduction of new services, installation of new network operating system, and addition of new hardware components, creation of new user roles and by attacks from various actors instigated by aggressors. Various security mechanisms employed in the network does not give the complete picture of security of complete network. In this paper we have proposed taxonomy and ontology which may be used to infer impact of various events happening in the network on security status of the network. Vulnerability, Network and Attack are the main taxonomy classes in the ontology. Vulnerability class describes various types of vulnerabilities in the network which may in hardware components like storage devices, computing devices or networks devices. Attack class has many subclasses like Actor class which is entity executing the attack, Goal class describes goal of the attack, Attack mechanism class defines attack methodology, Scope class describes size and utility of the target, Automation level describes the automation level of the attack Evaluation of security status of the network is required for network security situational awareness. Network class has network operating system, users, roles, hardware components and services as its subclasses. Based on this taxonomy ontology has been developed to perceive network security status. Finally a framework, which uses this ontology as knowledgebase has been proposed.
引用
收藏
页数:6
相关论文
共 50 条
[21]   An Ontology-Based Approach for Zero-Day Information Security Threat Management [J].
Odego, John Kennedy Otieno ;
Ogada, Kennedy Odhiambo ;
Kaburu, Dennis Mugambi .
International Journal of Information Security and Privacy, 2025, 19 (01)
[22]   Software security vulnerability patterns based on ontology [J].
Hu, Xuan ;
Chen, Junming ;
Li, Haifeng .
Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2024, 50 (10) :3084-3099
[23]   A Novel Approach to Power Transformer Fault Diagnosis Based on Ontology and Bayesian Network [J].
Lin, H. ;
Tang, W. H. ;
Ji, T. Y. ;
Wu, Q. H. .
2014 IEEE PES ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE (IEEE PES APPEEC), 2014,
[24]   Towards social network based approach for software engineering ontology sharing and evolution [J].
Wongthongtham, Pornpit ;
Chang, Elizabeth ;
Aseeri, Ahmed A. .
ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: OTM 2007 WORKSHOPS, PT 2, PROCEEDINGS, 2007, 4806 :1233-1243
[25]   A user-oriented ontology-based approach for network intrusion detection [J].
Hung, Shao-Shin ;
Liu, Damon Shing-Min .
COMPUTER STANDARDS & INTERFACES, 2008, 30 (1-2) :78-88
[26]   An ontology-based approach for delay analysis in construction [J].
Bilgin, Gozde ;
Dikmen, Irem ;
Birgonul, M. Talat .
KSCE JOURNAL OF CIVIL ENGINEERING, 2018, 22 (02) :384-398
[27]   An ontology-based approach for delay analysis in construction [J].
Gozde Bilgin ;
Irem Dikmen ;
M. Talat Birgonul .
KSCE Journal of Civil Engineering, 2018, 22 :384-398
[28]   Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of Things [J].
Xu, Guangquan ;
Cao, Yan ;
Ren, Yuanyuan ;
Li, Xiaohong ;
Feng, Zhiyong .
IEEE ACCESS, 2017, 5 :21046-21056
[29]   Ontology Based Coordination in RFID Network [J].
Ye Jianmu ;
Chen Lei .
2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, :10079-10082
[30]   Ontology-Based Reasoning with Uncertain Context in a Smart Home: A Decision Network Approach [J].
Mohammed, Abdul-Wahid ;
Xu, Yang ;
Liu, Ming .
2015 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE AND INTELLIGENT AGENT TECHNOLOGY (WI-IAT), VOL 1, 2015, :515-522