2008 Third International Conference on Risks and Security of Internet and Systems 2008
DOI: 10.1109/crisis.2008.4757461
|View full text |Cite
|
Sign up to set email alerts
|

An ontology-based approach to react to network attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0
3

Year Published

2009
2009
2014
2014

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(14 citation statements)
references
References 11 publications
0
11
0
3
Order By: Relevance
“…Considering the amount of research efforts targeting this area with a focus on the use of ontologies and a resource dependency graph [17,2,16,7], we will incorporate some of the introduced methods in our system in the future.…”
Section: Evaluation By System Administratorsmentioning
confidence: 99%
“…Considering the amount of research efforts targeting this area with a focus on the use of ontologies and a resource dependency graph [17,2,16,7], we will incorporate some of the introduced methods in our system in the future.…”
Section: Evaluation By System Administratorsmentioning
confidence: 99%
“…One system that utilizes ontology to aid in intrusion detection is the Reaction after Detection (ReD) Project [4]. The primary goal of ReD was to determine the most appropriate reaction, both short and long term, to an identified attack.…”
Section: Related Workmentioning
confidence: 99%
“…The ontology and the inference engine were used as an event aggregation language to confirm the existence of an attack on a wired network. Cuppens-Boulahia et al [16] presented an approach to react to network attacks using an ontology to store policy information and to generate new security models. The policy information models can be combined to prove the instantiation of the policies.…”
Section: Ontologymentioning
confidence: 99%