Ontology-based model of network and computer attacks for security assessment
Tóm tắt
Từ khóa
Tài liệu tham khảo
Igure V M, Willams R D. Taxonomies of attacks and vulnerabilities in computer systems [J]. IEEE Communications Surveys, 2008, 10(1): 6–19.
Howard J D, Longstaff T A. A common language for computer security incidents [R]. California: Sandia National Laboratories, 1998.
Alvarez G, Petrovic S. A taxonomy of Web attacks suitable for efficient encoding [J]. Computer & Security, 2003, 22(5): 435–449.
Hansman S, Hunt R. A taxonomy of network and computer attacks [J]. Computers & Security, 2005, 24(1): 31–43.
Simmons C, Ellis C, Shiva S, et al. AVOIDIT: A cyber attack taxonomy [R]. Memphis: University of Memphis, 2009.
Raskin V, Hempelmann C F, Triezenberg K E, et al. Ontology in information security: A useful theoretical foundation and methodological tool [C]//Proceedings of the 2001 Workshop on New Security Paradigms. New York: NSPW, 2001: 53–59.
Beitollahi H, Deconinck G. Analyzing well-known countermeasures against distributed denial of service attacks [J]. Computer Communications, 2012, 35(11): 1312–1332.
Simmonds A, Sandilands P, Ekert L V. An ontology for network security attacks [C]//Proceedings of Second Asian Applied Computing Conference. Kathmandu, Nepal: AACC, 2004: 317–323.
Wang J A, Guo M M, Camargo J. An ontological approach to computer system security [J]. Information Security Journal: A Global Perspective, 2010, 19(2): 61–73.
Venter H S, Eloff J H P. A taxonomy for information security technologies [J]. Computers & Security, 2003, 22(4): 299–307.
Herzog A, Shahmehri N, Duma C. An ontology of information security [J]. International Journal of Information Security and Privacy, 2007, 1(4): 1–23.
Noy N F, Mc-Guinness D L. Ontology development 101: A guide to creating your first ontology [R]. Stanford: Stanford Knowledge Systems Laboratory, 2001.
Blanco C, Lasheras J, Fernandez-Medina E. Basis for an integrated security ontology according to a systematic review of existing proposals [J]. Computers Standards & Interfaces, 2011, 33(4): 372–388.
Baader F, Calvanese D, Mc-Guinness D L, et al. Description logic handbook: Theory, implementation and application [M]. Cambridge, UK: Cambridge University Press, 2003.
Gruber T. Towards principles for the design of ontologies used for knowledge sharing [J]. International Journal of Human-Computer Studies, 1995, 43(5–6): 907–928.
Vargas L G, Dougherty J J. The analytic hierarchy process and multicriterion decision making [J]. American Journal of Mathematical and Management Sciences, 1982, 19(1): 59–92.
Holm H. Performance of automated network vulnerability scanning at remediating security issues [J]. Computers & Security, 2012, 31(2): 164–175.
Hu Ying, Xian Ming, Xiao Shun-ping. Design of a DoS attack effect evaluation system [J]. Computer Engineering & Science, 2005, 27(2): 15–22 (in Chinese).
