Ontology Based Approach for Perception of Network Security State

被引:0
作者
Bhandari, Pardeep [1 ]
Gujral, Manpreet Singh [2 ]
机构
[1] Doaba Coll, Jalandhar, Punjab, India
[2] Punjabi Univ, Patiala, Punjab, India
来源
2014 RECENT ADVANCES IN ENGINEERING AND COMPUTATIONAL SCIENCES (RAECS) | 2014年
关键词
Network Security Status; Ontology; Network Situational awareness; Taxonomy; ATTACKS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents an ontological approach to perceive the current security status of the network. Computer network is a dynamic entity whose state changes with the introduction of new services, installation of new network operating system, and addition of new hardware components, creation of new user roles and by attacks from various actors instigated by aggressors. Various security mechanisms employed in the network does not give the complete picture of security of complete network. In this paper we have proposed taxonomy and ontology which may be used to infer impact of various events happening in the network on security status of the network. Vulnerability, Network and Attack are the main taxonomy classes in the ontology. Vulnerability class describes various types of vulnerabilities in the network which may in hardware components like storage devices, computing devices or networks devices. Attack class has many subclasses like Actor class which is entity executing the attack, Goal class describes goal of the attack, Attack mechanism class defines attack methodology, Scope class describes size and utility of the target, Automation level describes the automation level of the attack Evaluation of security status of the network is required for network security situational awareness. Network class has network operating system, users, roles, hardware components and services as its subclasses. Based on this taxonomy ontology has been developed to perceive network security status. Finally a framework, which uses this ontology as knowledgebase has been proposed.
引用
收藏
页数:6
相关论文
共 50 条
[31]   Constructing Enterprise Information Network Security Risk Management Mechanism by Ontology [J].
Liu, Fong-Hao ;
Lee, Wei-Tsong .
JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2010, 13 (01) :79-87
[32]   Network security assessment using a semantic reasoning and graph based approach [J].
Wu, Songyang ;
Zhang, Yong ;
Cao, Wei .
COMPUTERS & ELECTRICAL ENGINEERING, 2017, 64 :96-109
[33]   An UML to OWL based approach for extracting Moodle's Ontology for Social Network Analysis [J].
Bouihi, Bouchra ;
Bahaj, Mohamed .
SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2018), 2019, 148 :313-322
[34]   Semantic Description and Verification of Security Policy Based on Ontology [J].
TANG Chenghua ;
WANG Lina ;
TANG Shensheng ;
QIANG Baohua ;
TIAN Jilong .
Wuhan University Journal of Natural Sciences, 2014, 19 (05) :385-392
[35]   Environmental Metrics for Software Security Based on a Vulnerability Ontology [J].
Wang, Ju An ;
Guo, Minzhe ;
Wang, Hao ;
Xia, Min ;
Zhou, Linfeng .
2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, :159-168
[36]   Toward a cybercrime classification ontology: A knowledge-based approach [J].
Donalds, Charlette ;
Osei-Bryson, Kweku-Muata .
COMPUTERS IN HUMAN BEHAVIOR, 2019, 92 :403-418
[37]   A Security Ontology for Security Requirements Elicitation [J].
Souag, Amina ;
Salinesi, Camille ;
Mazo, Raul ;
Comyn-Wattiau, Isabelle .
ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 :157-175
[38]   An Ontology Based Approach to Data Surveillance [J].
Pereira, Teresa ;
Santos, Henrique .
PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2008, :169-174
[39]   Ontology in Information Security [J].
Arbanas, Krunoslav ;
Cubrilo, Mirko .
JOURNAL OF INFORMATION AND ORGANIZATIONAL SCIENCES, 2015, 39 (02) :107-136
[40]   Ontology-Driven Cyber-Security Threat Assessment Based on Sentiment Analysis of Network Activity Data [J].
Lundquist, Doug ;
Zhang, Kunpeng ;
Ouksel, Aris .
2014 INTERNATIONAL CONFERENCE ON CLOUD AND AUTONOMIC COMPUTING (ICCAC 2014), 2014, :5-14