M. Nodine, R. Grimshaw, Peter P. Haglich, Steven M. Wilder, J. B. Lyles
{"title":"基于OWL的网络实验支持计算资产描述","authors":"M. Nodine, R. Grimshaw, Peter P. Haglich, Steven M. Wilder, J. B. Lyles","doi":"10.1109/ICSC.2011.83","DOIUrl":null,"url":null,"abstract":"Performing repeatable and controlled cyber experiments requires the precise description of hardware, software and testbed assets used during an experiment. An experiment specifies the assets that are required to build the system under test and the experimental framework. Different assets must be specified at different levels of detail to ensure experimental coherence and repeatability. This paper describes the family of asset description ontologies that is used in the National Cyber Range (NCR). This family of ontologies is used to characterize software and hardware assets used during cyber experiments. We also describe how these ontologies are used for different aspects of defining, setting up, executing, and analyzing the results of experiments, and indicate how they can be used for more general-purpose applications.","PeriodicalId":408382,"journal":{"name":"2011 IEEE Fifth International Conference on Semantic Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Computational Asset Description for Cyber Experiment Support Using OWL\",\"authors\":\"M. Nodine, R. Grimshaw, Peter P. Haglich, Steven M. Wilder, J. B. Lyles\",\"doi\":\"10.1109/ICSC.2011.83\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Performing repeatable and controlled cyber experiments requires the precise description of hardware, software and testbed assets used during an experiment. An experiment specifies the assets that are required to build the system under test and the experimental framework. Different assets must be specified at different levels of detail to ensure experimental coherence and repeatability. This paper describes the family of asset description ontologies that is used in the National Cyber Range (NCR). This family of ontologies is used to characterize software and hardware assets used during cyber experiments. We also describe how these ontologies are used for different aspects of defining, setting up, executing, and analyzing the results of experiments, and indicate how they can be used for more general-purpose applications.\",\"PeriodicalId\":408382,\"journal\":{\"name\":\"2011 IEEE Fifth International Conference on Semantic Computing\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-09-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 IEEE Fifth International Conference on Semantic Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSC.2011.83\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE Fifth International Conference on Semantic Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSC.2011.83","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Computational Asset Description for Cyber Experiment Support Using OWL
Performing repeatable and controlled cyber experiments requires the precise description of hardware, software and testbed assets used during an experiment. An experiment specifies the assets that are required to build the system under test and the experimental framework. Different assets must be specified at different levels of detail to ensure experimental coherence and repeatability. This paper describes the family of asset description ontologies that is used in the National Cyber Range (NCR). This family of ontologies is used to characterize software and hardware assets used during cyber experiments. We also describe how these ontologies are used for different aspects of defining, setting up, executing, and analyzing the results of experiments, and indicate how they can be used for more general-purpose applications.