A Target-Centric Ontology for Intrusion Detection
نویسندگان
چکیده
We have produced an ontology specifying a model of computer attack. Our ontology is based upon an analysis of over 4,000 classes of computer intrusions and their corresponding attack strategies and is categorized according to: system component targeted, means of attack, consequence of attack and location of attacker. We argue that any taxonomic characteristics used to define a computer attack be limited in scope to those features that are observable and measurable at the target of the attack. We present our model as a target-centric ontology that is to be refined and expanded over time. We state the benefits of forgoing dependence upon taxonomies, in favor of ontologies, for the classification of computer attacks and intrusions. We have specified our ontology using the DARPA Agent Markup Language and have prototyped it using DAMLJessKB. We present our model as a target-centric ontology and illustrate the benefits of utilizing an ontology lieu of a taxonomy, by presenting a use case scenario of a distributed intrusion detection system.
منابع مشابه
Modeling Computer Attacks: A Target-Centric Ontology for Intrusion Detection
We have produced an ontology specifying a model of computer attacks. Our ontology is based upon an analysis of over 4,000 classes of computer attacks and their corresponding attack strategies, and is model is categorized according to: system component targeted, means of attack, consequence of attack and location of attacker. Our analysis indicates that non-kernel space applications are most lik...
متن کاملUsing DAML+OIL to classify intrusive behaviours
We have produced an ontology specifying a model of computer attack. Our ontology is based upon an analysis of over 4000 classes of computer intrusions and their corresponding attack strategies and is categorised according to system component targeted, means of attack, consequence of attack and location of attacker. We argue that any taxonomic characteristics used to define a computer attack be ...
متن کاملA service-centric model for intrusion detection in next-generation networks
In this paper we argue for a new service-centric model for developing and implementing intrusion detection systems. This new approach is influenced by the convergence of computer networking and telecommunications systems, and ways that the telecoms industry manages issues of fraud. Interoperability of intrusion detection components with the rest of the system, in particular logging and billing ...
متن کاملAn Ontology-supported Outbound Intrusion Detection System
Outbound intrusion detection is a systems vigilance approach that aims at limiting the effects of a security threat by collectively scrutinizing outgoing traffic and local system activity. This paper summarizes the design and implementation of FROID, an outbound intrusion detection prototype built with agent technology that exploits the semantic power of ontologies in order to enable collaborat...
متن کاملA User-centric Intrusion Detection System by Using Ontology Approach
In the security infrastructure, intrusion detection has become an indispensable defense line in face of increasing vulnerabilities exposed in today’s computing systems and Internet. In this paper, our approach uses ontologies as a way of grasping the knowledge of a domain, expressing the intrusion detection system much more in terms of the end users domain, generating the intrusion detection mo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004