A description logic based approach for IDS security information management

被引:0
|
作者
Yan, W [1 ]
Hou, E [1 ]
Ansari, N [1 ]
机构
[1] New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ 07102 USA
关键词
network security; description logics; intrusion detection system; security information management;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The upsurge of network Distributed Denial of Service (DDoS) attacks on computer networks demands great effort in network security management. Currently, Intrusion Detection Systems (IDSs) are used to secure computer networks. However, IDSs may generate a huge volume of alerts, making it hard for security administrators to uncover hidden attack scenarios. In this paper, we propose a Description Logic-based approach for IDS event semantic analysis, which allows inferring attack scenarios and enabling the attack knowledge semantic queries. With Attack Knowledge Base consisting of Abox and Tbox, IDS alerts are converted into machine-understandable uniform alert streams. The ontology and attack instances of Attack Knowledge Base are applied to derive attack scenarios. Then the attack semantic query is implemented by spreading activation technique, which enables administrators to query the intrusion states of the networks.
引用
收藏
页码:118 / 121
页数:4
相关论文
共 50 条
  • [31] A Logic-based Approach to Network Security Risk Assessment
    Ji, Yi
    Wen, Danyan
    Wang, Haiquan
    Xia, Chunhe
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL III, 2009, : 9 - +
  • [32] Information Resource Management Technology Based on Fuzzy Logic
    Vysotska, Victoria
    Berko, Andriy
    Lytvyn, Vasyl
    Kravets, Petro
    Dzyubyk, Lyudmyla
    Bardachov, Yuriy
    Vyshemyrska, Svitlana
    [J]. LECTURE NOTES IN COMPUTATIONAL INTELLIGENCE AND DECISION MAKING (ISDMCI 2020), 2020, 1246 : 164 - 182
  • [33] A Fuzzy Logic-based Information Security Control Assessment for Organizations
    Otero, Angel R.
    Tejay, Gurvirender
    Otero, Luis Daniel
    Ruiz-Torres, Alex J.
    [J]. 2012 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS 2012), 2012, : 190 - 195
  • [34] A logic-based approach to semantic information extraction
    Ruffolo, Massimo
    Manna, Marco
    [J]. ICEIS 2006: PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: ARTIFICIAL INTELLIGENCE AND DECISION SUPPORT SYSTEMS, 2006, : 115 - 123
  • [35] A parallel control approach to optimization of information security management measures
    Wang P.
    Chen S.
    [J]. Zidonghua Xuebao/Acta Automatica Sinica, 2011, 37 (11): : 1351 - 1355
  • [36] INFORMATION SECURITY RISK MANAGEMENT: AN INTELLIGENCE- DRIVEN APPROACH
    Webb, Jeb
    Maynard, Sean
    Ahmad, Atif
    Shanks, Graeme
    [J]. AUSTRALASIAN JOURNAL OF INFORMATION SYSTEMS, 2014, 18 (03) : 391 - 404
  • [37] The EDITH approach: The management of authorisations and security in healthcare information systems
    Ferrara, FM
    [J]. TOWARDS SECURITY IN MEDICAL TELEMATICS: LEGAL AND TECHNICAL ASPECTS, 1996, 27 : 200 - 213
  • [38] Agentless Approach for Security Information and Event Management in Industrial IoT
    Zahid, Huma
    Hina, Sadaf
    Hayat, Muhammad Faisal
    Shah, Ghalib A.
    [J]. ELECTRONICS, 2023, 12 (08)
  • [39] Implementing a risk management approach for optimizing information security systems
    Petrescu, Marius
    Stegaroiu, Ion
    Braboveanu, Mioara
    Petrescu, Anca-Gabriela
    Sirbu, Nicoleta
    [J]. BUSINESS TRANSFORMATION THROUGH INNOVATION AND KNOWLEDGE MANAGEMENT: AN ACADEMIC PERSPECTIVE, VOLS 1-2, 2010, : 304 - 309
  • [40] Experiential operations: An information-based operational management approach for managing national security operations
    Webb, Ken
    [J]. ECIW 2007: PROCEEDINGS OF THE 6TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 291 - 302