2020 IEEE 6th International Conference on Computer and Communications (ICCC) 2020
DOI: 10.1109/iccc51575.2020.9345163
|View full text |Cite
|
Sign up to set email alerts
|

An Ontology to Promote Interoperability between Cyber-physical Security Systems in Critical Infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…This approach was necessary since there is little real-world data for malicious insider threat activities, effectively using human observations as a substitute. Canito et al [31] developed an ontology to improve interoperability between various cybersecurity systems, focusing on critical infrastructure and cyberphysical systems, particularly those systems found at airports. Their work included evaluating the SOFIT model for inclusion in their overall ontology.…”
Section: Ontologies For Insider Threatsmentioning
confidence: 99%
“…This approach was necessary since there is little real-world data for malicious insider threat activities, effectively using human observations as a substitute. Canito et al [31] developed an ontology to improve interoperability between various cybersecurity systems, focusing on critical infrastructure and cyberphysical systems, particularly those systems found at airports. Their work included evaluating the SOFIT model for inclusion in their overall ontology.…”
Section: Ontologies For Insider Threatsmentioning
confidence: 99%
“…Other research highlights the importance of having an effective model that regulates the management of security incidents in critical infrastructures and analyses the characteristics that an incident management model should have, focusing on the energy sector ( Pl ėta et al, 2020 ). Focusing on the critical sector of airports, attempts have been made to develop some models based on ontologies, which include aspects such as incident management, and the attempts made to correlate them and enrich them with information from external databases ( Canito et al, 2020 ). With regard to the aviation sector, research has also been carried out based on the analysis of the most serious incidents suffered in recent years, reaching the conclusion that it is necessary to develop specific CSIRTs for this sector and that they should be based on NIST principles ( Lekota and Coetzee, 2019 ).…”
Section: Related Work and Backgroundmentioning
confidence: 99%
“…Moreover, IoT devices are capable of collecting, pre-processing, and transmitting security-critical and sensitive private data and, hence, they are vulnerable targets for various intruders [22] [23]. Accordingly, to offer the greater and safe functionality of IoT systems, it is vital to strengthen the security and privacy of the underlying components, especially their protocols, devices, and data, against adversary agents [24]. Compared with the traditional communication systems, IoT systems are more prone to cyber security attacks due to [12], [25]:…”
Section: ) Perception Layermentioning
confidence: 99%