2020
DOI: 10.13052/jcsm2245-1439.925
|View full text |Cite
|
Sign up to set email alerts
|

A Semantic Model for Security Evaluation of Information Systems

Abstract: Modern information systems are characterized by huge security related data streams. For cyber security management in such systems, novel models and techniques for efficient processing of these data streams are required. The paper considers development and application of a semantic model for security evaluation. The proposed model is represented as the ontology of metrics that is based on the relations between sources of security related data, primary features of initial security data and goals of security eval… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…Although the hierarchical network structure design makes the management of ICS more convenient and efficient, the overall security of the network has been threatened to a certain extent. Moreover, due to the different control tasks completed by each network layer, the requirements for security protection intensity vary greatly, so this hierarchical network structure even increases the cost of overall network security protection [26,27].…”
Section: Application Of Lightgbm Feature Algorithm Fusion With Multil...mentioning
confidence: 99%
“…Although the hierarchical network structure design makes the management of ICS more convenient and efficient, the overall security of the network has been threatened to a certain extent. Moreover, due to the different control tasks completed by each network layer, the requirements for security protection intensity vary greatly, so this hierarchical network structure even increases the cost of overall network security protection [26,27].…”
Section: Application Of Lightgbm Feature Algorithm Fusion With Multil...mentioning
confidence: 99%
“…For dealing with the complex systems of systems that are vulnerable to cyberattacks, it aims to integrate different types of evaluation into a single model for all activities at all levels of all organizations in an enterprise. Finally, Doynikova et al (2020) propose a semantic model for the security evaluation of information systems in which an ontology of security metrics is developed to trace dependencies among available security knowledge sources, available raw security data and metrics calculated on their base (divided by the security assessment goals) and security assessment goals. The key aspect of ontology is to process huge streams of gathered security-related data (both static, from open-source databases, and dynamic, from security monitoring tools).…”
Section: Role Of Assurance Contextmentioning
confidence: 99%
“…Hence, this paper seeks to address this research void and bridge the knowledge gap. The system under evaluation, stakeholder, purpose of evaluation (needs), standards (approved methods), environments Doynikova et al (2020) Product, infrastructure (host, network), configuration, attacker…”
Section: Ontology-based Conceptual Modeling For Security Assurance Ev...mentioning
confidence: 99%
“…Assume that result obtained from the above formula is at a certain observation time t = 1. Then it is only necessary to calculate corresponding capability index of the node i based on its own safety status elements, s ij ∈ T (t) represents a certain service that the network node can provide at present, q 1 (•) represents the specific capability index calculation method, B i (t) represents the combination of attack sequences faced by the network node i in the observation period t, W i (t) represents the vulnerability set of the network node i in the observation period t, and E i (t) represents the network protection strategy set in the observation period t, which is calculated by [7]…”
Section: Quantitative Model Of Wn Safety Statusmentioning
confidence: 99%
“…Some research achievements have been obtained by some scientists, Pranav M. Pawar et al addressed behavioural modeling of medium access control security attacks in WSNs, which is benefit for establishing efficient and secure MAC clayer protocols [6]. Elena Doynikova et al considered development and application of a semantic model for security evaluation [7]. Shishir Kumar Shandilya proposed a network test-bed for examining new security concepts like cyber immunity [8].…”
Section: Introductionmentioning
confidence: 99%