Tytuł artykułu
Języki publikacji
Abstrakty
In this paper a novel approach to describe heterogeneous networks vulnerabilities is presented. We propose an ontology-based approach which can be utilized to describe vulnerabilities in critical architectures, single and multiple domain as well as in heterogeneous networks. In the paper our ontology based on asset-vulnerabilities is presented. The created ontology will be used in security-resiliency framework developed in INTERSECTION Project as well as in the Critical Infrastructures and SCADA ontology in the INSPIRE Project.
Słowa kluczowe
Czasopismo
Rocznik
Tom
Strony
35--44
Opis fizyczny
Bibliogr. 13 poz., rys.
Twórcy
autor
- ITTI Ltd. Poznań
autor
- ITTI Ltd. Poznań
autor
- ITTI Ltd. Poznań
- Institute of Telecommunications
autor
- ITTI Ltd. Poznań
- Institute of Telecommunications
autor
- ITTI Ltd. Poznań
- Adam Mickiewicz University, Poznań
autor
- ITTI Ltd. Poznań
- Institute of Telecommunications
- Adam Mickiewicz University, Poznań
Bibliografia
- [1] OWL Web Ontology Language Semantics and Abstract Syntax, June 2006, http://www.w3.org/TR/owl-features/ .
- [2] SWRL: A Semantic Web Rule Language Combning OWL and RuleML, W3C Member Submission, http://www.w3.org/Submission/SWRL/.
- [3] A. Gomez, O.Corcho, Ontology languages for the Semantic Web, IEEE Intelligent Systems, Jan./Febr., 2002.
- [4] FP6 NetQos Project – Deliverable 2.7.: Graphical User Interface and database repository.
- [5] FP7 INTERSECTION (INfrastructure for heTErogeneous, Reislient, Secure, Complex, Tightly Inter-Operating Networks) Project – Description of Work.
- [6] Ekelhart A., Fenz S., Klemen M., Weippl E., Security Ontologies: Improving Quantative Risk Analysis, Proc. of the 40th Hawaii International Conference on System Sciences, 2007.
- [7] ISO/IEC 13335-1:2004, Information Technology – Security Techniques – Management of information and communications technology security – Part 1: Concepts and models for information and communications technology security management.
- [8] Shared Information/Data Model – TeleManagement Forum, October 2002.
- [9] http://protege.stanford.edu/
- [10] Choraś Michał, Renk R., Flizikowski A., Hołubowicz W., Ontology-based description of networks vulnerabilities, Polish Journal of Environmental Science, 2008.
- [11] FP7 INSPIRE (INcreasing Security and Protection through Infrastructure REsilience) Project – Description of Work.
- [12] D’Antonio S., Romano L., Khelil A., Suri N., INcreasing Security and Protection through Infrastructure Resilience: the INSPIRE Project, Proc. of The 3rd International Workshop on Critical Information Infrastructures Security (CRITIS'08), October 2008.
- [13] G.A. Campbell, Ontology for Call Control, Technical Report CSM-170, ISSN 1460-9673, June 2006.
Identyfikator YADDA
bwmeta1.element.baztech-18b8f06d-662b-4179-8317-1011c2197bb3