Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of Things

被引:78
作者
Xu, Guangquan [1 ]
Cao, Yan [1 ]
Ren, Yuanyuan [1 ]
Li, Xiaohong [1 ]
Feng, Zhiyong [2 ]
机构
[1] Tianjin Univ, Sch Comp Sci & Technol, Tianjin Key Lab Adv Networking, Tianjin 300350, Peoples R China
[2] Tianjin Univ, Sch Comp Sci & Technol, Tianjin 300350, Peoples R China
来源
IEEE ACCESS | 2017年 / 5卷
基金
美国国家科学基金会;
关键词
Network security; sematic ontology; situation awareness; situation reasoning; reasoning rules; TAXONOMY;
D O I
10.1109/ACCESS.2017.2734681
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) brings the third development wave of the global information industry, which makes users, network, and perception devices cooperate more closely. However, if IoT has security problems, it may cause a variety of damage and even threaten human lives and properties. To improve the abilities of monitoring, providing emergency response, and predicting the development trend of IoT security, a new paradigm called network security situation awareness (NSSA) is proposed. However, it is limited by its ability to mine and evaluate security situation elements from multi-source heterogeneous network security information. To solve this problem, this paper proposes an IoT network security situation awareness model using a situation reasoning method based on semantic ontology and user-defined rules. Ontology technology can provide a unified and formalized description to solve the problem of semantic heterogeneity in the IoT security domain In this paper, four key sub-domains are proposed to reflect an IoT security situation: context, attack, vulnerability, and network flow. Furthermore, user-defined rules can compensate for the limited description ability of ontology, and hence can enhance the reasoning ability of our proposed ontology model. The examples in real IoT scenarios show that the ability of the network security situation awareness that adopts our situation reasoning method is more comprehensive and more powerful reasoning abilities than the traditional NSSA methods.
引用
收藏
页码:21046 / 21056
页数:11
相关论文
共 32 条
  • [1] [Anonymous], COMMON ATTACK PATTER
  • [2] [Anonymous], P 7 INT S COMP INT D
  • [3] [Anonymous], U TWENTE
  • [4] [Anonymous], OWL 2 WEB ONT LANG D
  • [5] [Anonymous], SWRL IQ USER MANUAL
  • [6] [Anonymous], P IEEE S SEC PRIV SP
  • [7] [Anonymous], IT SICHERHEIT IND 4
  • [8] Bass T., 1999, Proceedings of the IRIS National Symposium on Sensor and Data Fusion, P24
  • [9] OntoSecure: A Semantic Web Based tool for Network Security Status Prediction
    Bhandari, Pardeep
    Singh, Manpreet
    [J]. 2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 551 - 555
  • [10] Integration of Cloud computing and Internet of Things: A survey
    Botta, Alessio
    de Donato, Walter
    Persico, Valerio
    Pescape, Antonio
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 : 684 - 700