2018
DOI: 10.5755/j01.itc.47.4.20007
|View full text |Cite
|
Sign up to set email alerts
|

An Ontology-based Storage of Security Information

Abstract: The paper suggests an ontology-based approach for design of security data storage. It analyzes heterogeneous security information for construction of the security storage and the statistics of links between various security data sources. The suggested ontological model of the data storage allows connecting both heterogeneous security data and security data of the same type from various sources. The main features the ontological model, its key elements and links between them are described in details. In additio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
10
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
1

Relationship

3
2

Authors

Journals

citations
Cited by 5 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…All this creates required basis for our ontology of security metrics. We started this research in [8,37] where we aimed to integrate various security data sources, and proceeded it in [9], where we proposed the first upper level ontology for attack goals determination. This paper extends the previous ontology with new security metrics and details it in terms of their interrelations to answer security questions using logical inference.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…All this creates required basis for our ontology of security metrics. We started this research in [8,37] where we aimed to integrate various security data sources, and proceeded it in [9], where we proposed the first upper level ontology for attack goals determination. This paper extends the previous ontology with new security metrics and details it in terms of their interrelations to answer security questions using logical inference.…”
Section: Related Workmentioning
confidence: 99%
“…As soon as the approach proposed in this paper requires an accurate structuring and detailing security related knowledge, the areas outlined in CyBOK (including software security, network security, malware, and others) and their further detailing can be used as the basis for development of our approach. At the same time, the proposed in this paper approach is based on the set of hierarchically interconnected security metrics for security assessments [6][7][8]. The structure of subject areas introduced in CyBOK will allow one to evaluate what cybersecurity areas are covered with metrics by our approach.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…There are two types of sources: structured data and unspecified data. In [58], we outlined the following open sources of structured data considering objects of information security assessments: vulnerability databases, attack patterns databases, weaknesses databases, software and hardware databases, and so on. For accurate attack forecasting in real time, it is required to add another type of source data, network traffic, and event logs (which is unspecified).…”
mentioning
confidence: 99%