Ontology Based Approach for Network Security

被引:0
|
作者
Arunadevi, M. [1 ]
Perumal, K. S. [1 ]
机构
[1] Madurai Kamaraj Univ, Dept Comp Applicat, Madurai, Tamil Nadu, India
来源
PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT) | 2016年
关键词
Network Security Status; Ontology; Network Simulation awareness; Taxonomy; ATTACKS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Computer network is a dynamic entity whose state changes with the introduction of new services, installation of new network operating system, and addition of new hardware components, creation of new user roles and by attacks from various actors instigated by aggressors. Unauthorized intrusion into a computer system or network is one of the most serious threats to computer security. Intrusion detection systems have been developed to provide early warning of an intrusion so that defensive action can be taken to prevent or minimize damage. Intrusion detection involves detecting unusual patterns of activity or patterns of activity that are known to correlate with intrusions. One of the two most publicized threats to security is the intruder (the other is viruses), often referred to as a hacker or cracker. Various security mechanisms employed in the network does not give the complete picture of security of complete network. In this paper, we have derived more number of probabilities for prediction rules and implemented those probabilities in the simulation model web application to protect the datacenter.
引用
收藏
页码:573 / 578
页数:6
相关论文
共 50 条
  • [1] Ontology Based Approach for Perception of Network Security State
    Bhandari, Pardeep
    Gujral, Manpreet Singh
    2014 RECENT ADVANCES IN ENGINEERING AND COMPUTATIONAL SCIENCES (RAECS), 2014,
  • [2] An Ontology Based Approach to Information Security
    Pereira, Teresa
    Santos, Henrique
    METADATA AND SEMANTIC RESEARCH, PROCEEDINGS, 2009, 46 : 183 - 192
  • [3] Ontology-based model of network and computer attacks for security assessment
    Gao J.-B.
    Zhang B.-W.
    Chen X.-H.
    Luo Z.
    Journal of Shanghai Jiaotong University (Science), 1600, Shanghai Jiaotong University (18): : 554 - 562
  • [4] Ontology-Based Model of Network and Computer Attacks for Security Assessment
    高建波
    张保稳
    陈晓桦
    罗铮
    Journal of Shanghai Jiaotong University(Science), 2013, 18 (05) : 554 - 562
  • [5] An Ontology-Centric Approach for Network Security Situation Awareness
    Wang, Yixuan
    Zhao, Bo
    Li, Weidong
    Zhu, Lingzi
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 777 - 787
  • [6] The Semantic Approach to Cyber Security Towards Ontology Based Body of Knowledge
    Aviad, Adiel
    Wecel, Krzysztof
    Abramowicz, Witold
    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 328 - 336
  • [7] An Ontology-based Approach to Security Pattern Selection
    Hui Guan
    Hongji Yang
    Jun Wang
    International Journal of Automation and Computing, 2016, (02) : 168 - 182
  • [8] An Ontology-based Approach to Security Pattern Selection
    Guan, Hui
    Yang, Hongji
    Wang, Jun
    INTERNATIONAL JOURNAL OF AUTOMATION AND COMPUTING, 2016, 13 (02) : 168 - 182
  • [9] An ontology for network security attacks
    Simmonds, A
    Sandilands, P
    van Ekert, L
    APPLIED COMPUTING, PROCEEDINGS, 2004, 3285 : 317 - 323
  • [10] Network security situation elements fusion method based on ontology
    Si, Cheng
    Zhang, Hongqi
    Wang, Yongwei
    Liu, Jiang
    2014 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2014), VOL 2, 2014,