Powering Filtration Process of Cyber Security Ecosystem Using Knowledge Graph

被引:9
作者
Asamoah, Claude [1 ]
Tao, Lixin
Gai, Keke [1 ]
Jiang, Ning [1 ,2 ]
机构
[1] Pace Univ, Dept Comp Sci, New York, NY 10038 USA
[2] Henan Univ, Software Sch, Kaifeng 475001, Henan, Peoples R China
来源
2016 IEEE 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD) | 2016年
关键词
Cyber security; knowledge graph; filtration process; cloud computing;
D O I
10.1109/CSCloud.2016.36
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cyber Security breaches and attacks are on the ascendancy as corporations, governments, universities, and private individuals are conducting their business and personal transactions on the web. This increasing participating on the web necessitates that robust and efficient cyber security systems need to be put in place by these entities to safeguard their cyber assets. Intelligent Systems needs to be employed to buttress the cyber security protocols established in cloud computing for proper decision-making, which may depend on the effective knowledge representation. However, as one of the dominant industry standards for knowledge representation, Web Ontology Language (OWL) has limitations, such as the lack of support for custom relations. Pace University has extended OWL to support Knowledge Graph as a replacement to better support knowledge representation and decision making. This paper examines using KG as the basis in the design of a knowledge-representation system that drives the filtration process of a company's cyber security ecosystem in cloud computing by employing a use case of cyber security communications in-order to identify the entity relations of threat types for the filtration process.
引用
收藏
页码:240 / 246
页数:7
相关论文
共 18 条
[1]   Simplified Approach for Representing Part-Whole Relations in OWL-DL Ontologies [J].
Altowayan, A. Aziz ;
Tao, Lixin .
2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, :1399-1405
[2]   Similarity reasoning for the semantic web based on fuzzy concept lattices: An informal approach [J].
Formica, Anna .
INFORMATION SYSTEMS FRONTIERS, 2013, 15 (03) :511-520
[3]   Ontology-Based Knowledge Representation for Secure Self-Diagnosis in Patient-Centered Teleheath with Cloud Systems [J].
Gai, Keke ;
Qiu, Meikang ;
Jayaraman, Saravanan ;
Tao, Lixin .
2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, :98-103
[4]   Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing [J].
Gai, Keke ;
Qiu, Meikang ;
Zhao, Hui ;
Tao, Lixin ;
Zong, Ziliang .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 59 :46-54
[5]   Proactive Attribute-based Secure Data Schema for Mobile Cloud in Financial Industry [J].
Gai, Keke ;
Qiu, Meikang ;
Thuraisingham, Bhavani ;
Tao, Lixin .
2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, :1332-1337
[6]   Electronic Health Record Error Prevention Approach Using Ontology in Big Data [J].
Gai, Keke ;
Qiu, Meikang ;
Chen, Li-Chiou ;
Liu, Meiqin .
2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, :752-757
[7]   Towards Cloud Computing: A Literature Review on Cloud Computing and its Development Trends [J].
Gai, Keke ;
Li, Saier .
2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, :142-146
[8]   Intercrossed Access Controls for Secure Financial Services on Multimedia Big Data in Cloud Systems [J].
Li, Yibin ;
Gai, Keke ;
Ming, Zhong ;
Zhao, Hui ;
Qiu, Meikang .
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2016, 12 (04)
[9]   Semantic Web applications: a framework for industry and business exploitation - What is needed for the adoption of the Semantic Web from the market and industry [J].
Lytras, Miltiadis D. ;
Garcia, Roberto .
INTERNATIONAL JOURNAL OF KNOWLEDGE AND LEARNING, 2008, 4 (01) :93-108
[10]  
Minsky M., 1974, REPRESENTING KNOWLED