Abstract
In this paper we introduced our designed attacks ontology. The proposed ontology is in the domain of Denial of Service attack. We studied and peruse great number of network connection that caused a Denial of Service attack, specially those connections in the KDD cup99 dataset. We used Protégé software for building this ontology. For checking the consistency and accuracy of the designed ontology, we use Racer software and also to test the ontology we use KDD cup99 test dataset. Finally we use Jena framework and SPARQL query language to inference and deduction across the attacks ontology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Undercoffer. J, Joshi. A, Pinkston. J, Modeling Computer Attacks: An Ontology for Intrusion Detection, Springer, pp. 113–135, 2003.
J. Undercoffer, A. Joshi,, T. Finin, and John Pinkston, “A target centric ontology for intrusion detection: using DAML+OIL to classify intrusive behaviors”, Knowledge Engineering Review, Cambridge University Press, pp. 23-29, January, 2004.
V. Raskin, C. Helpenmann, K. Triezenberg, and S. Nirenburg, “Ontology in information security: a useful theoretical foundation and methodological tool”, New Security Paradigms Workshop, ACM Press, pp. 53-59, Cloudcroft, NM, 2001.
Gomez J., Dasgupta D., “Evolving Fuzzy Classifiers for Intrusion Detection”, Proceeding Of 2002 IEEE Workshop on Information Assurance, United States Military Academy, West Point NY, June 2001.
Guan Y., Ghorbani A. And Belacel N., “Y-means: A Clustering Method for Intrusion Detection”, Proceedings of Canadian Conference on Electrical and Computer Engineering. Montreal, Quebec, Canada. May 4-7, 2003.
Ilgun K., Kemmerer R.A., and Porras P.A., “State Transition Analysis: A Rule-Based Intrusion Detection Approach,” IEEE Transaction on Software Engineering, Vol 2, No 3, 21(3), March 1995.
Lee W., Stolfo S.J., Mok K., “A data mining framework for building intrusion detection models”, Proceedings of IEEE Symposium on Security and Privacy, pp 120 –132, 1999.
Mohajerani M., Morini A., Kianie M. “NFIDS: A Neuro-Fuzzy Intrusion Detection System”, IEEE 2003.
Simon H, Ray , A taxonomy of network and computer attacks, Elsevier, Computers & Security (2005) 24, 31e43
G.Denker, L. Kagal, T. Finin, M. Paolucci, K. Sycara, “ Security for DAML Web Services: Annotation and Matchmaking,” The Semantic Web (ISWC 2003), LNCS 2870, Springer, pp. 335- 350, 2003.
N. Tuck, T. herwood,B. Calder, G.Varghese, “ Deterministic Memory- Efficient String matching algorithms for Intrusion Detection,” Twenty- third Annual Joint Conference of the IEEE Computer and Communications Societies ( INFOCOM 2004), pp. 2628- 2639, 2004.
Deborah L. McGuinness, Ontology Come of Age, spinning the semantic web,2003.
DAML+ OIL. Available at: http://www.daml.org/2000/12/daml+oil.daml
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media B.V.
About this paper
Cite this paper
Abdoli, F., Meibody, N., Bazoubandi, R. (2010). An Attacks Ontology for computer and networks attack. In: Sobh, T. (eds) Innovations and Advances in Computer Sciences and Engineering. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3658-2_83
Download citation
DOI: https://doi.org/10.1007/978-90-481-3658-2_83
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-3657-5
Online ISBN: 978-90-481-3658-2
eBook Packages: EngineeringEngineering (R0)