An Ontology for Network Security Attacks

@inproceedings{Simmonds2004AnOF,
  title={An Ontology for Network Security Attacks},
  author={Andrew James Simmonds and Peter Sandilands and Louis van Ekert},
  booktitle={AACC},
  year={2004}
}
We first consider network security services and then review threats, vulnerabilities and failure modes. This review is based on standard texts, using well-known concepts, categorizations, and methods, e.g. risk analysis using asset-based threat profiles and vulnerability profiles (attributes). The review is used to construct a framework which is then used to define an extensible ontology for network security attacks. We present a conceptualization of this ontology in figure 1. 
Domain Ontology to Distinguish Different Types of Rootkits
TLDR
An ontology for rootkits is presented which contains many concepts relating to security, cyber-attacks and operating systems and can be used to distinguish different types ofrootkits.
Vulnerability Assessment In Cloud Computing
TLDR
This paper presents a vulnerability management framework for cloud computing that uses ontologies, a real world concepts that are modelled using an ontology language, to manage vulnerabilities in cloud.
Towards an Ontology-based Organizational Risk Assessment in Collaborative Environments Using the SemanticLIFE
The rise in interconnectivity in the last few years has made computer systems and networks more vulnerable to threats as they are accessed by an ever increasing number of users. Nowadays
Network Security: Attacks, Tools and Techniques
TLDR
This paper mainly emphasizes on the network security and presents some major issues that can affect the network.
Automated classification of computer network attacks
TLDR
An automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology, which describes different types of network attacks through classes and inter-class relationships.
Security Usage and Its Important for Network Using Case Study: US-Visit
with the evolution of Internet, security takes central role and its history provides a greater understanding of the emergence of security paradigms. In light of this, Internet itself enables several
A Knowledge-Oriented Approach to Security Requirements Engineering for E-Voting System
TLDR
The knowledge acquired through the process of eliciting and analyzing secure E-Voting System is represented in the form of UML models; which can be made available to future developers and the dependency towards security experts can be reduced.
Revisiting Security Ontologies
TLDR
A critical study of security ontologies has been accomplished in which these ontologies have been further classified into three major categories: Generalized, Specific with sub categories: Web Services and Web Ontology Language; and Miscellaneous.
Using Encryption for Network Security
TLDR
Different attack methods which are used, as well as different defence method against them are outlined, to protect the websites domains or servers from various forms of attack.
Ontology in Information Security
TLDR
This paper identifies, analyzes and systematizes the relevant papers published in scientific journals indexed in selected scientific databases, in period from 2004 to 2014 in the field of information security ontology.
...
...

References

SHOWING 1-10 OF 12 REFERENCES
A Policy Based Approach to Security for the Semantic Web
TLDR
This research investigates the marking up of web entities with a semantic policy language and the use of distributed policy management as an alternative to traditional authentication and access control schemes.
Security for DAML Web Services: Annotation and Matchmaking
TLDR
This paper proposes several security-related ontologies that are designed to represent well-known security concepts that are used to describe the security requirements and capabilities of web services providers and requesting agents.
Authorization and privacy for semantic Web services
TLDR
In this work, ontologies are proposed for modeling the high-level security requirements and capabilities of Web services and clients and helps to match a client's request with appropriate services-those based on security criteria as well as functional descriptions.
Network Security Essentials: Applications and Standards
TLDR
This book is intended as a one-semester undergraduate course on network security for computer science, computer engineering, and electrical engineering majors, and serves as a basic reference volume and is suitable for self-study.
The Semantic Web - ISWC 2003
TLDR
This work ran into a number of problems concerning alternative interpretations of the SN notation and the inability to express some of the interpretations in OWL, and details a list of issues to consider when describing formally concepts in any ontology, and a collection of criteria for evaluating alternative representations.
The OCTAVE Methodology for Self-Directed Risk Assessment
  • 2002
Homeland Insecurity. Available from http://www.theatlantic.com/issues
  • Homeland Insecurity. Available from http://www.theatlantic.com/issues
  • 2002
interviewed for the Atlantic Monthly by Mann, Charles (September
  • 2002
A Taxonomy of Security Faults
  • 1996
The OCTAVE Methodology for Self-Directed Risk Assessment. Carnegie Mellon Software Engineering Institute Available from http://www.fedcirc.gov/library/presentations/octave.pdf [accessed 12 th
  • The OCTAVE Methodology for Self-Directed Risk Assessment. Carnegie Mellon Software Engineering Institute Available from http://www.fedcirc.gov/library/presentations/octave.pdf [accessed 12 th
  • 2002
...
...