2018 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA) 2018
DOI: 10.1109/cybersa.2018.8551486
|View full text |Cite
|
Sign up to set email alerts
|

CoCoa: An Ontology for Cybersecurity Operations Centre Analysis Process

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 23 publications
(20 citation statements)
references
References 4 publications
0
20
0
Order By: Relevance
“…To a lesser extent, the use of languages such as SPARQL, SWRL, XML and OWL 2 is observed (Baesso Moreira et al, 2019;Onwubiko et al, 2018;Albalushi et al, 2018;Tseng et al, 2017;Bergner and Lechner, 2017;Fontenele and Sun, 2016;Maines et al, 2015;Geller et al, 2014).…”
Section: Table 5 Ontology Classification By Used Toolsmentioning
confidence: 99%
“…To a lesser extent, the use of languages such as SPARQL, SWRL, XML and OWL 2 is observed (Baesso Moreira et al, 2019;Onwubiko et al, 2018;Albalushi et al, 2018;Tseng et al, 2017;Bergner and Lechner, 2017;Fontenele and Sun, 2016;Maines et al, 2015;Geller et al, 2014).…”
Section: Table 5 Ontology Classification By Used Toolsmentioning
confidence: 99%
“…However, it is not designed to represents all possible network events but only those that are already identified as related to an attack. Note that Onwubiko proposed an ontology [22] for analysis in Security Operations Centre based on the same principles.…”
Section: Handling Security Related Informationmentioning
confidence: 99%
“…firewall, routers, applications, intrusion detection systems (IDS) etc. and also, the ability to ingest network-wide information such as flow events and threat intelligence information to detect emerging and inflight incidents [3,4,5].…”
Section: C: Technologymentioning
confidence: 99%
“…a) The supplier organisation is tasked to do "the heavy lifting and shifting"a perception that the expertise to run a functional SOC is readily available in the supplier organisation, hence it is believed that the supplier organisation is by far better to run and maintain a SOC service, while the client organisation becomes responsible for security incident management, escalation and decision making as the overarching risk owner. b) Most client organisations work 9am to 5pm, therefore, client organisations prefer to leverage the 24x7 3 SOC service operated by the supplier organisations, a preference many client organisations believe to offer cost saving and value for money.…”
Section: C: Technologymentioning
confidence: 99%