Behavior Ontology: A Framework to Detect Attack Patterns for Security

被引:2
|
作者
Woo, Sujeong [1 ]
On, Jinho [1 ]
Lee, Moonkun [1 ]
机构
[1] Chonbuk Natl Univ, Dept Comp Engn, Chonju, South Korea
关键词
Behavior Ontology; Attack; Pattern; Abstraction; Security-Critical Systems; Meta-Model;
D O I
10.1109/WAINA.2013.42
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a new method to detect attack patterns in security-critical systems, based on a new notion of Behavior Ontology. Generally security-critical systems are large and complex, and are subject to be attacked by attackers in every possible way. Therefore it is very complicated to detect various attacks systematically in some semantic structure. This paper handles the complication with Behavior Ontology, where patterns of attacks in the systems are defined as a sequence of actions on class ontology for the systems. By the nature of the actions, the attack patterns can be abstracted in hierarchical order, forming a lattice or a lattice of lattices, based on inclusion relations. Once the behavior ontology for the attach patterns are defined, the attacks in the target systems can be detected both semantically and hierarchically in the structure on the ontology. Compared with other attack models, the analysis on the behavior ontology shows that the approach in the paper is very effective and efficient in time and space. The approach can be considered as the first attempt to detect attack patterns with the notion of behavior ontology.
引用
收藏
页码:738 / 743
页数:6
相关论文
共 50 条
  • [21] A Novel Framework to detect and block DDoS attack at the Application layer
    Sivabalan, Sujatha
    Radcliffe, P. J.
    [J]. 2013 IEEE TENCON SPRING CONFERENCE, 2013, : 578 - 582
  • [22] A General Framework to Detect Behavioral Design Patterns
    Liu, Cong
    van Dongen, Boudewijn
    Assy, Nour
    van der Aalst, Wil M. P.
    [J]. PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - COMPANION (ICSE-COMPANION, 2018, : 234 - 235
  • [23] A framework for attack patterns' discovery in honeynet data
    Thonnard, Olivier
    Dacier, Marc
    [J]. DIGITAL INVESTIGATION, 2008, 5 (SUPPL.) : S128 - S139
  • [24] Semantic Mapping of Security Events to Known Attack Patterns
    Ma, Xiao
    Davoodi, Elnaz
    Kosseim, Leila
    Scarabeo, Nicandro
    [J]. NATURAL LANGUAGE PROCESSING AND INFORMATION SYSTEMS (NLDB 2018), 2018, 10859 : 91 - 98
  • [25] Ontology based APT Attack Behavior Analysis in Cloud Computing
    Choi, Junho
    Choi, Chang
    Lynn, Htet Myet
    Kim, Pankoo
    [J]. 2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2015), 2015, : 375 - 379
  • [26] A Framework For Intelligent DDoS Attack Detection and Response using SIEM and Ontology
    Cakmakci, Salva Daneshgadeh
    Hutschenreuter, Helmar
    Maeder, Christian
    Kemmerich, Thomas
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2021,
  • [27] A Novel Method to Detect and Prevent SQLIA Using Ontology to Cloud Web Security
    Durai, K. Naveen
    Subha, R.
    Haldorai, Anandakumar
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (04) : 2995 - 3014
  • [28] A Novel Method to Detect and Prevent SQLIA Using Ontology to Cloud Web Security
    K. Naveen Durai
    R. Subha
    Anandakumar Haldorai
    [J]. Wireless Personal Communications, 2021, 117 : 2995 - 3014
  • [29] Electric Security Data Integration Framework based on Ontology Reasoning
    Liang, Liang
    [J]. 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT, 2018, 139 : 583 - 587
  • [30] Ontology for Attack Detection: Semantic-Based Approach for Genomic Data Security
    Noor, Saba
    Ahmed, Mansoor
    Saqib, Malik Najmus
    Abdullah-Al-Wadud, M.
    Islam, Md Saiful
    Fazal-e-Amin
    [J]. JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2017, 7 (06) : 1309 - 1323