Developing an Ontology of the Cyber Security Domain
نویسندگان
چکیده
This paper reports on a trade study we performed to support the development of a Cyber ontology from an initial malware ontology. The goals of the Cyber ontology effort are first described, followed by a discussion of the ontology development methodology used. The main body of the paper then follows, which is a description of the potential ontologies and standards that could be utilized to extend the Cyber ontology from its initially constrained malware focus. These resources include, in particular, Cyber and malware standards, schemas, and terminologies that directly contributed to the initial malware ontology effort. Other resources are upper (sometimes called 'foundational') ontologies. Core concepts that any Cyber ontology will extend have already been identified and rigorously defined in these foundational ontologies. However, for lack of space, this section is profoundly reduced. In addition, utility ontologies that are focused on time, geospatial, person, events, and network operations are briefly described. These utility ontologies can be viewed as specialized super-domain or even mid-level ontologies, since they span many, if not most, ontologies -including any Cyber ontology. An overall view of the ontological architecture used by the trade study is also given. The report on the trade study concludes with some proposed next steps in the iterative evolution of the
منابع مشابه
An Ontology for a National Cyber-Security Culture Environment
The modern-day use of cyberspace has created a world that is increasingly relying on online services to operate. Nevertheless, cyberspace has a ‘dark side’; as there are many risks associated it. This ‘dark side’ has called for safety and security measures to be implemented through cyber security. As such, cultivating a supportive culture is perceived to be an important contributing factor to c...
متن کاملToward an Ontology Architecture for Cyber-Security Standards
The rapid growth in magnitude and complexity of cyber-security information and event management (CSIEM) has ignited a trend toward security automation and information exchange standards. Making Security Measurable (MSM) references a collection of open community standards for the common enumeration, expression and reporting of cyber-security-related information. While MSM-related standards are v...
متن کاملBig Data for Cyber-attack Management
Big Data has become big business. This paper explores a means of improving Cyber-security using Big Data technologies, ontology, and decision support for preventing or reducing losses from cyber-attacks. Because of the priority of this threat to national security it is necessary to attain results far superior to those found in modern-day security operations centers. Focus is on the potential ap...
متن کاملA Probabilistic Ontology for Large-Scale IP Geolocation
Mapping IP addresses to physical locations is important for a host of cyber security applications. Examples include identifying the origin of cyber attacks, protecting against fraud in internet commerce, screening emails for phishing, and enforcing restrictions on commerce with sanctioned countries. Simultaneous geolocation of large numbers of IP hosts is needed for cyber situation awareness. E...
متن کاملPublic Transport Ontology for Passenger Information Retrieval
Passenger information aims at improving the user-friendliness of public transport systems while influencing passenger route choices to satisfy transit user’s travel requirements. The integration of transit information from multiple agencies is a major challenge in implementation of multi-modal passenger information systems. The problem of information sharing is further compounded by the multi-l...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012