Behavior Ontology: A Framework to Detect Attack Patterns for Security

被引:2
|
作者
Woo, Sujeong [1 ]
On, Jinho [1 ]
Lee, Moonkun [1 ]
机构
[1] Chonbuk Natl Univ, Dept Comp Engn, Chonju, South Korea
关键词
Behavior Ontology; Attack; Pattern; Abstraction; Security-Critical Systems; Meta-Model;
D O I
10.1109/WAINA.2013.42
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a new method to detect attack patterns in security-critical systems, based on a new notion of Behavior Ontology. Generally security-critical systems are large and complex, and are subject to be attacked by attackers in every possible way. Therefore it is very complicated to detect various attacks systematically in some semantic structure. This paper handles the complication with Behavior Ontology, where patterns of attacks in the systems are defined as a sequence of actions on class ontology for the systems. By the nature of the actions, the attack patterns can be abstracted in hierarchical order, forming a lattice or a lattice of lattices, based on inclusion relations. Once the behavior ontology for the attach patterns are defined, the attacks in the target systems can be detected both semantically and hierarchically in the structure on the ontology. Compared with other attack models, the analysis on the behavior ontology shows that the approach in the paper is very effective and efficient in time and space. The approach can be considered as the first attempt to detect attack patterns with the notion of behavior ontology.
引用
收藏
页码:738 / 743
页数:6
相关论文
共 50 条
  • [1] An Ontology for Security Patterns
    Pereira Vale, Anelis
    Fernandez, Eduardo B.
    [J]. 2019 38TH INTERNATIONAL CONFERENCE OF THE CHILEAN COMPUTER SCIENCE SOCIETY (SCCC), 2019,
  • [2] Extending a security ontology framework to model CAPEC attack paths and TAL adversary profiles
    Mariotti, Francesco
    Tavanti, Matteo
    Montecchi, Leonardo
    Lollini, Paolo
    [J]. 2022 18TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2022), 2022, : 25 - 32
  • [3] Security Attack Analysis Using Attack Patterns
    Li, Tong
    Paja, Elda
    Mylopoulos, John
    Horkoff, Jennifer
    Beckers, Kristian
    [J]. 2016 IEEE TENTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2016, : 513 - 525
  • [4] Adaptive cross-site scripting attack detection framework for smart devices security using intelligent filters and attack ontology
    Chaudhary, Pooja
    Gupta, B. B.
    Singh, A. K.
    [J]. SOFT COMPUTING, 2023, 27 (08) : 4593 - 4608
  • [5] Adaptive cross-site scripting attack detection framework for smart devices security using intelligent filters and attack ontology
    Pooja Chaudhary
    B. B. Gupta
    A. K. Singh
    [J]. Soft Computing, 2023, 27 : 4593 - 4608
  • [6] Security Attack Mitigation Framework for the Cloud
    Datta, Esha
    Goyal, Neeraj
    [J]. 2014 60TH ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM (RAMS), 2014,
  • [7] A Threat Prediction Framework for Network Security Based on Attack Patterns and Colored Petri Nets
    Chien, Sheng-Hui
    Ho, Cheng-Seen
    [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL IV, 2010, : 492 - 496
  • [8] Security Testing Based on Attack Patterns
    Bozic, Josip
    Wotawa, Franz
    [J]. 2014 SEVENTH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2014), 2014, : 4 - 11
  • [9] SIMOnt: A Security Information Management Ontology Framework
    Abulaish, Muhammad
    Nabi, Syed Irfan
    Alghathbar, Khaled
    Chikh, Azeddine
    [J]. SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 201 - +
  • [10] Ontology Based Patterns for Software Security Engineering
    Moradian, Esmiralda
    Hakansson, Anne
    Andersson, Jan-Olof
    [J]. ADVANCES IN KNOWLEDGE-BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, 2012, 243 : 406 - 419