Advertisement

Ontology-Based Decision Support for Security Management in Heterogeneous Networks

  • Michał Choraś
  • Rafał Kozik
  • Adam Flizikowski
  • Rafał Renk
  • Witold Hołubowicz
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5755)

Abstract

In this paper our original methodology of applying ontology-based logic into decision support system for security management in heterogeneous networks is presented. Such decision support approach is used by the off-network layer of security and resiliency mechanisms developed in the INTERSECTION Project. Decision support application uses knowledge about networks vulnerabilities to support off-network operator to manage and control in-networks components such as probes, intrusion detection systems, Complex Event Processor, Reaction and Remediation. Hereby, both IVO (Intersection Vulnerability Ontology) as well as PIVOT - decision support system based on the vulnerability ontology are presented.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    FP7 INTERSECTION Deliverable D.2.2: Identification and classification of vulnerabilities of network infrastructures (2008)Google Scholar
  2. 2.
    Flizikowski, A., et al.: On Applying Ontologies to Security and QoS Management in Heterogeneous Networks. In: Information Systems Architecture and Technology - Information Systems and Computer Communications Network, 189-200, ISBN 978-83-7493-416-9 (2008)Google Scholar
  3. 3.
    Michal, C., et al.: Ontology-based description of networks vulnerabilities. Polish Journal of Environmental Studies 5c (2008)Google Scholar
  4. 4.
    ISO/IEC 13335-1:2004, Information Technology Security Techniques Management of information and communications technology security Part 1: Concepts and models for information and communications technology security managementGoogle Scholar
  5. 5.
    Shared Information/Data Model TeleManagement Forum (2002)Google Scholar
  6. 6.
  7. 7.
    FP7 INTERSECTION (INfrastructure for heTErogeneous, Reislient, Secure, Complex, Tightly Inter-Operating Networks) Project Description of Work.Google Scholar
  8. 8.
    Ekelhart, A., et al.: Security Ontologies: Improving Quantative Risk Analy-sis. In: Proc. of the 40th Hawaii International Conference on System Sciences (2007)Google Scholar
  9. 9.
  10. 10.
    OWL Web Ontology Language Semantics and Abstract Syntax (2006), http://www.w3.org/TR/owl-features/
  11. 11.
    SWRL: A Semantic Web Rule Language Combning OWL and RuleML, W3C Member Submission, http://www.w3.org/Submission/SWRL/
  12. 12.
    Spector, A.Z.: Achieving application requirements. Distributed Systems, 0-201-41660-3, 19-33 (1990)Google Scholar
  13. 13.
    Gomez, A., Corcho, O.: Ontology languages for the Semantic Web. IEEE Intelligent Systems 1904, 54–60 (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Michał Choraś
    • 1
    • 2
  • Rafał Kozik
    • 2
  • Adam Flizikowski
    • 1
    • 2
  • Rafał Renk
    • 1
    • 3
  • Witold Hołubowicz
    • 1
    • 3
  1. 1.ITTI Ltd.Poznań
  2. 2.Institute of Telecommunications, UT&LS Bydgoszcz 
  3. 3.Adam Mickiewicz UniversityPoznań

Personalised recommendations