RISK INTELLIGENCE RETRIEVAL BASED ON ONTOLOGY

被引:0
作者
Sarala, R. [1 ]
Zayaraz, G. [1 ]
Vijayalakshmi, V. [2 ]
Priyanka, E. [1 ]
机构
[1] Pondicherry Engn Coll, Dept Comp Sci & Engn, Pondicherry, India
[2] Pondicherry Engn Coll, Dept Elect & Commun Engn, Pondicherry, India
来源
2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC) | 2014年
关键词
Attack Patterns; Ontology; Risk Intelligence; Information Security Risk Management; Proactive Approach; Attack Prediction; TECHNOLOGY;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Information Security Risk Management is one of the key factors in ensuring security of the Information Assets of any organization. Information Security Risk Management has gained more importance recently as information security breaches increase and information infrastructures are constantly being targeted by various attacks. The risk assessment activity in information security risk management helps in identifying the potential risks to the information assets. To perform proactive risk management, the attack related information is required to construct the attack patterns which could be used to predict the future attacks. Attack patterns can be stored as they help in extracting risk intelligence for effective risk management. Storing of attack patterns is achieved by constructing Ontology. Ontologies are used to formally represent domain knowledge. The ontology stores patterns of attacks against that target the confidentiality, integrity and availability of the information assets. The extraction of risk intelligence is done by mapping the log files of the currently monitored network activity with the stored attack patterns to predict forth coming attacks. The ontology created can also help in sharing attack related information among different organizations interested in performing Information Security Risk Management.
引用
收藏
页码:243 / 246
页数:4
相关论文
共 11 条
  • [1] Scenario discovery using abstracted correlation graph
    Al-Mamory, Safaa O.
    Zhang, Hong Li
    [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 702 - +
  • [2] Knowledge-Based Risk Management framework for Information Technology project
    Alhawari, Samer
    Karadsheh, Louay
    Talet, Amine Nehari
    Mansour, Ebrahim
    [J]. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2012, 32 (01) : 50 - 65
  • [3] Intrusion scenarios detection based on data mining
    Ding, Yu-Xin
    Wang, Hai-Sen
    Liu, Qing-Wei
    [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 1293 - 1297
  • [4] Toward principles for the design of ontologies used for knowledge sharing
    Gruber, TR
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 1995, 43 (5-6) : 907 - 928
  • [5] Guebitz Brigitte, 2012, J ON EXPERT SYSTEMS
  • [6] VuWiki: An Ontology-Based Semantic Wiki for Vulnerability Assessments
    Khazai, Bijan
    Kunz-Plapp, Tina
    Buescher, Christian
    Wegner, Antje
    [J]. INTERNATIONAL JOURNAL OF DISASTER RISK SCIENCE, 2014, 5 (01) : 55 - 73
  • [7] Kim Thanh Tran Thi, 2011, 5 INT C ADV SEM PROC
  • [8] Liu FH, 2010, J APPL SCI ENG, V13, P79
  • [9] NECHES R, 1991, AI MAG, V12, P36
  • [10] Ning P., 2008, P 9 ACM C COMP COMM, P245