期刊文献+

用语义网技术建模特征识别和攻击模型 被引量:1

Using semantic Web technology to build signatures identification and attack model
下载PDF
导出
摘要 安全特征识别和攻击的预测是网络安全领域内必不可少的功能部分,而攻击模型和其他安全特征的描述和定义需要专门的语言。然而,目前此类语言存在诸多问题,如语言功能单一,适用性差;缺乏开放性,语义不一致和缺乏可重用性等。为了改善这种情况,利用本体建模方法,通过一个典型攻击行为的建模,证明本体语言具有的特点支持其作为安全特征描述语言。 Signatures indentification of security and attack forecast are integrant function parts of network security field, and the description and definition of attack models and other security signatures request special language. But there exist many questions on the current such languages, such as solitary function of language and weak adaptablility; lack of openness and semantic coherence, and absent reuse ablility. In order to improve this state, the ontology's modeling means were used. It was demonstrated that ontology's language is fit for the description and definition of attack models and other security signatures by a representative attack.
作者 黄俊 张雷
出处 《计算机应用》 CSCD 北大核心 2005年第7期1558-1561,共4页 journal of Computer Applications
关键词 本体 网络安全 攻击语言 特征识别 ontology network security attack language signatures identification
  • 相关文献

参考文献8

  • 1邓志鸿,唐世渭,张铭,杨冬青,陈捷.Ontology研究综述[J].北京大学学报(自然科学版),2002,38(5):730-738. 被引量:763
  • 2ECKMANN S , VIGNA G , KEMMERER R . STATL : An Attack Language for State-based Intrusion Detection[J]. Journal of Computer Security, 2002, 10(1/2):71-104.
  • 3褚永刚,宋传恒,杨义先,胡正名.入侵检测系统攻击语言研究[J].信息安全与通信保密,2003(4):40-42. 被引量:1
  • 4FEIERTAG R, KAHN C, PORRAS P, et al. A Common Intrusion Specification Language[ EB/OL]. http://www. isi. edu/ brian/cidf/drafts/language.txt, 1999 -06.
  • 5MCGUINNESS DL, VAN HARMELEN F. OWL Web Ontology Language Overview, World Wide Web Consortium(W3C) recommendation[S]. www. w3. org/TR/owl- features, 2003.
  • 6NOY NF, MCGUINNESS DE. A Guide to Creating Your First Ontology[EB/OL]. http://protege. stanford. edu/publications/ontology-development/ontology101-noy-mcguinness. html, 2003.
  • 7KAHN C, BOLINGER D, SCHACKENBERG D. Communication in the Common Intrusion Detection Framework v 0.7[ EB/OL]. http://www. isi. edu/brian/cidf/drafts/communication.txt, 1998 -06.
  • 8UNDERCOFFER J, JOSHI A, PINKSTON J. Modeling Computer Attacks: An Ontology for Intrusion Detection[A]. Proceedings of RAID 2003, LNCS 2820[C], 2003.113 - 135.

二级参考文献27

  • 1[13]SENSUS.http://www.isi.edu/natural-language/resources/sensus.html
  • 2[14]Mikrokmos.http://crl.nmsu.edu/Research/Projects/mikro/
  • 3[15]Guarino N.Semantic Matching:Formal Ontological Distinctions for Information Organization,Extraction,and Integration.In:Pazienza M T,eds.Information Extraction:A Multidisciplinary Approach to an Emerging Information Technology,Springer Verlag,1997,139~170
  • 4[16]Perez A G,Benjamins V R.Overview of Knowledge Sharing and Reuse Components:Ontologies and Problem-Solving Methods.Workshop on Ontologies and Problem-Solving Methods:Lessons Learned and Future Trends (IJCAI99),de Agosto,Estocolmo,1999
  • 5[17]Gruber T R.Towards Principles for the Design of Ontologies Used for Knowledge Sharing.International Journal of Human-Computer Studies,1995,43:907~928
  • 6[18]Guarino N,Welty C.A Formal Ontology of Properties.In:Dieg R,Corby O,eds.the Proceedings of the 12th International Conference on Knowledge Engineering and Knowledge Management (EKAW'2000),Springer Verlag,2000,97~112
  • 7[19]Guarino N,Masolo C,Vetere G.OntoSeek:Content-Based Access to the Web.IEEE Intelligent Systems,1999,14(3):70~80
  • 8[20]Shun S B,Motta E,Domingue J.ScholOnto:an Ontology-based Digital Library Server for Research Documents and Discourse.Intl J Digital Libraries,2000,3(3):237~248
  • 9[21]Arpirez J,Perez A G,Lozano A,et al.(Onto)2 agent:An Ontology-based WWW Broker to Select Ontologies.In:Gomez-Perez A,Benjamins V R,eds.Proceedings of the Workshop on Application of Ontologies and Problem-Solving Methods UK,1998,16~24
  • 10[22]Ontobroker.http://ontobroker.aifb.uni-karlsruhe.de

共引文献762

同被引文献38

引证文献1

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部