Ontology-based model of network and computer attacks for security assessment

Journal of Shanghai Jiaotong University (Science) - Tập 18 Số 5 - Trang 554-562 - 2013
Jianbo Gao1, Baowen Zhang1, Chen Xiao-hua2, Zheng Luo3
1School of Information Security Engineering, Shanghai Jiaotong University, Shanghai, 200240, China
2General Office, China Information Security Certification Center, Beijing, 100020, China
3Information Classified Security Protection Evaluation Center, Third Institute of Ministry of Public Security of China, Shanghai, 201204, China

Tóm tắt

Từ khóa


Tài liệu tham khảo

Igure V M, Willams R D. Taxonomies of attacks and vulnerabilities in computer systems [J]. IEEE Communications Surveys, 2008, 10(1): 6–19.

Howard J D, Longstaff T A. A common language for computer security incidents [R]. California: Sandia National Laboratories, 1998.

Alvarez G, Petrovic S. A taxonomy of Web attacks suitable for efficient encoding [J]. Computer & Security, 2003, 22(5): 435–449.

Hansman S, Hunt R. A taxonomy of network and computer attacks [J]. Computers & Security, 2005, 24(1): 31–43.

Simmons C, Ellis C, Shiva S, et al. AVOIDIT: A cyber attack taxonomy [R]. Memphis: University of Memphis, 2009.

Raskin V, Hempelmann C F, Triezenberg K E, et al. Ontology in information security: A useful theoretical foundation and methodological tool [C]//Proceedings of the 2001 Workshop on New Security Paradigms. New York: NSPW, 2001: 53–59.

Beitollahi H, Deconinck G. Analyzing well-known countermeasures against distributed denial of service attacks [J]. Computer Communications, 2012, 35(11): 1312–1332.

Simmonds A, Sandilands P, Ekert L V. An ontology for network security attacks [C]//Proceedings of Second Asian Applied Computing Conference. Kathmandu, Nepal: AACC, 2004: 317–323.

Wang J A, Guo M M, Camargo J. An ontological approach to computer system security [J]. Information Security Journal: A Global Perspective, 2010, 19(2): 61–73.

Venter H S, Eloff J H P. A taxonomy for information security technologies [J]. Computers & Security, 2003, 22(4): 299–307.

Herzog A, Shahmehri N, Duma C. An ontology of information security [J]. International Journal of Information Security and Privacy, 2007, 1(4): 1–23.

Noy N F, Mc-Guinness D L. Ontology development 101: A guide to creating your first ontology [R]. Stanford: Stanford Knowledge Systems Laboratory, 2001.

Blanco C, Lasheras J, Fernandez-Medina E. Basis for an integrated security ontology according to a systematic review of existing proposals [J]. Computers Standards & Interfaces, 2011, 33(4): 372–388.

Baader F, Calvanese D, Mc-Guinness D L, et al. Description logic handbook: Theory, implementation and application [M]. Cambridge, UK: Cambridge University Press, 2003.

Gruber T. Towards principles for the design of ontologies used for knowledge sharing [J]. International Journal of Human-Computer Studies, 1995, 43(5–6): 907–928.

Vargas L G, Dougherty J J. The analytic hierarchy process and multicriterion decision making [J]. American Journal of Mathematical and Management Sciences, 1982, 19(1): 59–92.

Holm H. Performance of automated network vulnerability scanning at remediating security issues [J]. Computers & Security, 2012, 31(2): 164–175.

Hu Ying, Xian Ming, Xiao Shun-ping. Design of a DoS attack effect evaluation system [J]. Computer Engineering & Science, 2005, 27(2): 15–22 (in Chinese).