{"title":"建立网络空间国家行为者本体论","authors":"Giacomo De Colle","doi":"arxiv-2408.01787","DOIUrl":null,"url":null,"abstract":"To improve cyber threat analysis practices in cybersecurity, I present a plan\nto build a formal ontological representation of state actors in cyberspace and\nof cyber operations. I argue that modelling these phenomena via ontologies\nallows for coherent integration of data coming from diverse sources, automated\nreasoning over such data, as well as intelligence extraction and reuse from and\nof them. Existing ontological tools in cybersecurity can be ameliorated by\nconnecting them to neighboring domains such as law, regulations, governmental\ninstitutions, and documents. In this paper, I propose metrics to evaluate\ncurrently existing ontological tools to create formal representations in the\ncybersecurity domain, and I provide a plan to develop and extend them when they\nare lacking.","PeriodicalId":501208,"journal":{"name":"arXiv - CS - Logic in Computer Science","volume":"35 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Towards an ontology of state actors in cyberspace\",\"authors\":\"Giacomo De Colle\",\"doi\":\"arxiv-2408.01787\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To improve cyber threat analysis practices in cybersecurity, I present a plan\\nto build a formal ontological representation of state actors in cyberspace and\\nof cyber operations. I argue that modelling these phenomena via ontologies\\nallows for coherent integration of data coming from diverse sources, automated\\nreasoning over such data, as well as intelligence extraction and reuse from and\\nof them. Existing ontological tools in cybersecurity can be ameliorated by\\nconnecting them to neighboring domains such as law, regulations, governmental\\ninstitutions, and documents. In this paper, I propose metrics to evaluate\\ncurrently existing ontological tools to create formal representations in the\\ncybersecurity domain, and I provide a plan to develop and extend them when they\\nare lacking.\",\"PeriodicalId\":501208,\"journal\":{\"name\":\"arXiv - CS - Logic in Computer Science\",\"volume\":\"35 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-08-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Logic in Computer Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2408.01787\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Logic in Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2408.01787","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
To improve cyber threat analysis practices in cybersecurity, I present a plan
to build a formal ontological representation of state actors in cyberspace and
of cyber operations. I argue that modelling these phenomena via ontologies
allows for coherent integration of data coming from diverse sources, automated
reasoning over such data, as well as intelligence extraction and reuse from and
of them. Existing ontological tools in cybersecurity can be ameliorated by
connecting them to neighboring domains such as law, regulations, governmental
institutions, and documents. In this paper, I propose metrics to evaluate
currently existing ontological tools to create formal representations in the
cybersecurity domain, and I provide a plan to develop and extend them when they
are lacking.