The Inference Graph of Cybersecurity Rules

被引:0
作者
Sheniar, Dawood [1 ]
Hadaad, Nabeel [1 ]
Addie, Ron [1 ]
机构
[1] Univ Southern Queensland, Fac HES, Toowoomba, Qld, Australia
来源
2019 29TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC) | 2019年
关键词
Cybersecurity rules; inference graph; security design; proof; stakeholder security analysis; cybersecurity architecture; Netml;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The concept that cybersecurity architecture is the discovery, definition and validation of rules is introduced. The new concept of inference graphs for illustrating the relationship between cybersecurity rules is defined. Three increasingly complex examples of inference graphs for systems needing cybersecurity architecture are presented, including the detailed proofs which form the basis of these inference graphs, in some cases. The software which has been developed to support the development and use of cybersecurity inference graphs is described including details of the public server where it can be used. It is shown that cybersecurity inference graphs can significantly contribute to development of, and validation of cybersecurity and also that rigorous validation of cybersecurity is not necessarily as difficult as previously thought.
引用
收藏
页数:6
相关论文
共 12 条
[1]  
Addie Ron, 2006, P AUSTR TELECOMMUNIC, P1
[2]  
Addie Ronald G, DEPENDABLE AUTONOMIC
[3]  
[Anonymous], 2018, A guide to the project management body of knowledge, V6th
[4]  
[Anonymous], 2019, 2019 SPRING SIM C SP
[5]   Knowledge Graph based Learning Guidance for Cybersecurity Hands-on Labs [J].
Deng, Yuli ;
Lu, Duo ;
Huang, Dijiang ;
Chung, Chun-Jen ;
Lin, Fanjie .
PROCEEDINGS OF THE ACM CONFERENCE ON GLOBAL COMPUTING EDUCATION (COMPED '19), 2019, :194-200
[6]   Integrating Textual and Graphical Modelling Languages [J].
Engelen, Luc ;
van den Brand, Mark .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2010, 253 (07) :105-120
[7]  
Hadaad Nabeel, 2015, INT TELECOMMUNICATIO
[8]   A Practical Approach to Constructing a Knowledge Graph for Cybersecurity [J].
Jia, Yan ;
Qi, Yulu ;
Shang, Huaijun ;
Jiang, Rong ;
Li, Aiping .
ENGINEERING, 2018, 4 (01) :53-60
[9]  
Pingle A, 2019, Arxiv, DOI arXiv:1905.02497
[10]  
Rerup N., 2018, HANDS ON CYBERSECURI