Developing An Ontology Of Cyber-Operations In Networks Of Computers

Andrei Zamfira, H. Ciocarlie
{"title":"Developing An Ontology Of Cyber-Operations In Networks Of Computers","authors":"Andrei Zamfira, H. Ciocarlie","doi":"10.1109/ICCP.2018.8516644","DOIUrl":null,"url":null,"abstract":"Many detection techniques have been proposed until now that struggle to keep up with the inherent complexity of applications, networks and protocols, resulting also in the growing rate of attacks that exploit them. Security frameworks that are created using an ontological approach are the next-gen systems of defense that have some advantages over the conventional techniques because they can capture the context of information and are capable to filter these contents depending on some certain factors. This paper proposes a method of creating an ontology that can be used for improving detection capabilities of attacks at all application levels. The ontology serves as a data model and knowledge base of the cyberoperations domain that conceptualizes and stores various types of data needed in the process of detecting an aware situation, such as information about attacks (types), OSI stack levels to which are targeted (software, network, hardware), countermeasure methods, resources necessary, knowledge required etc. The quality of the proposed model was assessed using a methodology known as OntoClean, that is a comprehensive suite of metrics for ontology evaluation that can comprise up to 15 criteria, as will be discussed during this paper. The ontology was tested in attack detection using a prototype web application firewall. In the evaluation process we used the famous dataset Kyoto2006+ proposed by the University of Kyoto in this scope. The results yielded for attacks detection by our proposed system were compared to other existing security solutions, like ModSecurit and Snort. In the conclusion section are stated the future directions of this research towards constructing reliable systems for cyber-security.","PeriodicalId":259007,"journal":{"name":"2018 IEEE 14th International Conference on Intelligent Computer Communication and Processing (ICCP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 14th International Conference on Intelligent Computer Communication and Processing (ICCP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCP.2018.8516644","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Many detection techniques have been proposed until now that struggle to keep up with the inherent complexity of applications, networks and protocols, resulting also in the growing rate of attacks that exploit them. Security frameworks that are created using an ontological approach are the next-gen systems of defense that have some advantages over the conventional techniques because they can capture the context of information and are capable to filter these contents depending on some certain factors. This paper proposes a method of creating an ontology that can be used for improving detection capabilities of attacks at all application levels. The ontology serves as a data model and knowledge base of the cyberoperations domain that conceptualizes and stores various types of data needed in the process of detecting an aware situation, such as information about attacks (types), OSI stack levels to which are targeted (software, network, hardware), countermeasure methods, resources necessary, knowledge required etc. The quality of the proposed model was assessed using a methodology known as OntoClean, that is a comprehensive suite of metrics for ontology evaluation that can comprise up to 15 criteria, as will be discussed during this paper. The ontology was tested in attack detection using a prototype web application firewall. In the evaluation process we used the famous dataset Kyoto2006+ proposed by the University of Kyoto in this scope. The results yielded for attacks detection by our proposed system were compared to other existing security solutions, like ModSecurit and Snort. In the conclusion section are stated the future directions of this research towards constructing reliable systems for cyber-security.
计算机网络中网络操作本体的发展
到目前为止,已经提出了许多检测技术,难以跟上应用程序、网络和协议固有的复杂性,这也导致利用它们的攻击速度不断增长。使用本体论方法创建的安全框架是下一代防御系统,它比传统技术有一些优势,因为它们可以捕获信息的上下文,并能够根据某些特定因素过滤这些内容。本文提出了一种创建本体的方法,该本体可用于提高所有应用层对攻击的检测能力。本体是网络作战领域的数据模型和知识库,它概念化和存储检测感知情况过程中所需的各种类型的数据,如攻击信息(类型)、目标OSI堆栈级别(软件、网络、硬件)、对策方法、所需资源、所需知识等。所提议的模型的质量是使用一种称为OntoClean的方法来评估的,这是一套全面的本体评估指标,可以包含多达15个标准,这将在本文中讨论。利用原型web应用防火墙对本体进行了攻击检测。在评估过程中,我们使用了京都大学在该范围内提出的著名数据集Kyoto +。我们提出的系统对攻击检测产生的结果与其他现有的安全解决方案(如ModSecurit和Snort)进行了比较。在结论部分,提出了构建可靠的网络安全系统的未来研究方向。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信