Ontology-Driven Security Requirements Recommendation for APT Attack

被引:7
|
作者
Kim, MinJu [1 ]
Dey, Sangeeta [1 ]
Lee, Seok-Won [2 ]
机构
[1] Ajou Univ, Dept Comp Engn, Suwon, South Korea
[2] Ajou Univ, Dept Software & Comp Engn, Suwon, South Korea
来源
2019 IEEE 27TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW 2019) | 2019年
基金
新加坡国家研究基金会;
关键词
Advanced Persistent Threat (APT); Security Requirement; Ontology; Knowledge Base;
D O I
10.1109/REW.2019.00032
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Advanced Persistent Threat (APT) is one of the cyber threats that continuously attack specific targets exfiltrate information or destroy the system [1]. Because the attackers use various tools and methods according to the target, it is difficult to describe APT attack in a single pattern. Therefore, APT attacks are difficult to defend against with general countermeasures. In these days, systems consist of various components and related stakeholders, which makes it difficult to consider all the security concerns. In this paper, we propose an ontology knowledge base and its design process to recommend security requirements based on APT attack cases and system domain knowledge. The proposed knowledge base is divided into three parts; APT ontology, general security knowledge ontology, and domain-specific knowledge ontology. Each ontology can help to understand the security concerns in their knowledge. While integrating three ontologies into the problem domain ontology, the appropriate security requirements can be derived with the security requirements recommendation process. The proposed knowledge base and process can help to derive the security requirements while considering both real attacks and systems.
引用
收藏
页码:150 / 156
页数:7
相关论文
共 50 条
  • [1] Ontology-Driven Guidance for Requirements Elicitation
    Farfeleder, Stefan
    Moser, Thomas
    Krall, Andreas
    Stalhane, Tor
    Omoronyia, Inah
    Zojer, Herbert
    SEMANTIC WEB: RESEARCH AND APPLICATIONS, PT II, 2011, 6644 : 212 - 226
  • [2] Ontology-driven evolution of software security
    Peldszus, Sven
    Burger, Jens
    Kehrer, Timo
    Jurjens, Jan
    DATA & KNOWLEDGE ENGINEERING, 2021, 134
  • [3] Ontology-Driven Requirements Elicitation Based on Scenario
    Fan, Zhijun
    Jiang, Zhaoliang
    AUTOMATIC MANUFACTURING SYSTEMS II, PTS 1 AND 2, 2012, 542-543 : 1459 - 1462
  • [4] Ontology-driven word recommendation for mobile Web search
    Arechiga, Daniel
    Crestani, Fabio
    Vegas, Jesus
    KNOWLEDGE ENGINEERING REVIEW, 2014, 29 (02): : 186 - 200
  • [5] An Ontology-Driven Approach Applied to Information Security
    Vorobiev, Artem
    Bekmamedova, Nargiza
    JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2010, 42 (01): : 61 - 76
  • [6] Ontology-driven Security Testing of Web Applications
    Bozic, Josip
    Li, Yihao
    Wotawa, Franz
    2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE TESTING (AITEST), 2020, : 115 - 122
  • [7] Ontology-driven Requirements Engineering With Reference to the Aerospace Industry
    Kossmann, Mario
    Gillies, Andrew
    Odeh, Mohammed
    Watts, Stephen
    2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, : 95 - 103
  • [8] Ontology-driven Requirements Engineering: Building the OntoREM Meta Model
    Kossmann, Mario
    Odeh, Mohammed
    Wong, Richard
    Gillies, Andrew
    2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 1378 - +
  • [9] MUPRET: An Ontology-Driven Traceability Tool for Multiperspective Requirements Artifacts
    Assawamekin, Namfon
    Sunetnanta, Thanwadee
    Pluempitiwiriyawej, Charnyote
    PROCEEDINGS OF THE 8TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, 2009, : 943 - 948
  • [10] An ontology-driven Semantic Speech Recognition system for Security tasks
    Barroso, N.
    de Ipina, K. Lopez
    Ezeiza, A.
    Hernandez, C.
    2011 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2011,