期刊文献+

一种基于本体的潜在多步网络攻击发现方法

An Ontology-based Method for Discovering Potential Multi-stage Cyber Attacks
下载PDF
导出
摘要 随着互联网的普及,网络攻击已经成为制约互联网发展的重要安全问题。随着社交工程等新型攻击手段的出现,网络攻击呈现出复杂性、隐蔽性和分布式等特点,不断威胁着网络安全和信息安全。因此,提出了一种基于本体的潜在网络攻击路径的发现方法。具体地,通过本体构建网络信息系统模型,描述攻击者、安全弱点和攻击方法,利用SWRL规则刻画攻击者能力,并结合本体推理机来自动识别信息系统潜在的多步网络攻击途径。 With the popularity of the Internet, the cyber attack becomes an important problem in restricting the development of the Internet. With the advent of new-type attacks such as social engineering, the cyber attack is characterized by complexity, invisibility and distribution, directly threatening network security and information security. In this paper, an ontology-based method to find out potential network attack paths is proposed. By constructing a network information system model based on ontology, the attacker, security vulnerabilities and attack methods are described, and with SWRL rules, the capabilities of the attacker portrayed, and meanwhile, the ontology reasoning engine is used to automatically identify potential multi-step network attack toute.
作者 魏忠 张保稳
出处 《通信技术》 2018年第2期419-424,共6页 Communications Technology
基金 科技部国家重点研发计划(No.2016YFB0800100,No.2016YFB0800105) 国家自然科学地区科学基金项目(No.61562004)
关键词 网络攻击 网络安全 本体 社交工程 cyber attack network security ontology social engineering
  • 相关文献

参考文献1

二级参考文献48

  • 1Neches R, Fikes R E, Finin T, et al. Enabling technology for knowledge sharing[J]. AI Magazine, 1991,12 (3) : 36-56.
  • 2Donner M. Toward a security ontology [J]. IEEE Security and Privacy, 2003,1 (3) : 6-7.
  • 3Schumacher M. Security engineering with patterns:Origins, the- oretical model, and new applications [C] // Lecture Notes in Computer Science 2754. Springer-Verlag, 2003.
  • 4Denker G, Kagal L, Finin T, et al. Security for DAML Web Services: Annotation and Matchmaking[C] //Proc, of the 2nd International Semantic Web Conference(ISWC2003). Sanibel Is- land, Florida, 2003.
  • 5Kim A,Luo J, Kang NL Security Ontology for Annotating Re- sources[C]//Proceedings of the On the Move to Meaningful In- ternet Systems, COopIS, IDA, and ODBASE, Lecture Notes in Computer Science 376 l. Springer-Verlag, 2005:1483-1499.
  • 6Tsoumas B, Dritsas S, Gritzalis D. An ontology-based approach to information system security management[C]//3rd Interna- tional Workshop on Mathematical Methods, Models and Archi- tectures for Computer Networks Security. Russia, 2005.
  • 7DMTF CIM Policy Model v. 2.81 [EB/OL]. http://www. dmtf. org/standards/published doeurnents, php, 2005-02.
  • 8Fenz S, Goluch G, Weippl E. Information Security Fortification by ontological Mapping of the ISO/IEC 27001 Standard[C]// 13th IEEE International Symposium on Pacific Rim Dependable Computing. 2007 : 381-388.
  • 9Ekelhart A, Fenz S, Klemen M, et al. Security ontolngy: Simula- ring threats to corporate assets[C] //Bagchi A, Atluri V, eds. Information Systems Security,volume 4332 of Lecture Notes in Computer Science. Springer, 2006: 249-259.
  • 10Ekelhart A, Fenz S, Klemen M, et al. Security ontologies: Impro- ving quantitative risk analysis [C]//40th Hawaii International Conference on System Sciences. HICSS2007, number 0-7695- 2755-8 ,Waikoloa, HI, USA,IEEE Computer Society, 2007 : 156- 162.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部