An Ontology of Information Security

被引:111
|
作者
Herzog, Almut [1 ]
Shahmehri, Nahid [2 ]
Duma, Claudiu [2 ]
机构
[1] Linkoping Univ, Dept Comp & Informat Sci, Linkoping, Sweden
[2] Linkoping Univ, Comp Sci, Linkoping, Sweden
关键词
computer science; information systems; is security; ontologies; software;
D O I
10.4018/jisp.2007100101
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present a publicly available, OWL-based ontology of information security which models assets, threats, vulnerabilities, countermeasures and their relations. The ontology can be used as a general vocabulary, roadmap, and extensible dictionary of the domain of information security. With its help, users can agree on a common language and definition of terms and relationships. In addition to browsing for information, the ontology is also useful for reasoning about relationships between its entities, for example, threats and countermeasures. The ontology helps answer questions like: Which countermeasures detect or prevent the violation of integrity of data? Which assets are protected by SSH? Which countermeasures thwart buffer overflow attacks? At the moment, the ontology comprises 88 threat classes, 79 asset classes, 133 countermeasure classes and 34 relations between those classes. We provide the means for extending the ontology, and provide examples of the extendibility with the countermeasure classes 'memory protection' and 'source code analysis'. This article describes the content of the ontology as well as its usages, potential for extension, technical implementation and tools for working with it.
引用
收藏
页码:1 / 23
页数:23
相关论文
共 50 条
  • [1] Ontology in Information Security
    Arbanas, Krunoslav
    Cubrilo, Mirko
    [J]. JOURNAL OF INFORMATION AND ORGANIZATIONAL SCIENCES, 2015, 39 (02) : 107 - 136
  • [2] AN ONTOLOGY TO THE INFORMATION SECURITY MANAGEMENT
    Mattos, Mauro Marcelo
    Heckmann, Jacques Robert
    da Silva, Paulo Fernando
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS CISIS 2015, 2015, : 326 - 329
  • [3] Maintenance & Information Security Ontology
    Si Ahmed, Boualem
    Berrani, Meryem
    Fatima, Nibouche
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT), 2017, : 312 - 317
  • [4] Information Security in Enterprises - Ontology Perspective
    Schiavone, Stephen
    Garg, Lalit
    Summers, Kelly
    [J]. PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON IS MANAGEMENT AND EVALUATION (ECIME 2013), 2013, : 164 - 173
  • [5] An Ontology Based Approach to Information Security
    Pereira, Teresa
    Santos, Henrique
    [J]. METADATA AND SEMANTIC RESEARCH, PROCEEDINGS, 2009, 46 : 183 - 192
  • [6] An Ontology Based Storage of Security Information
    Kotenko, Igor
    Fedorchenko, Andrey
    Doynikova, Elena
    Chechulin, Andrey
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (04): : 655 - 667
  • [7] The Order Machine - The Ontology of Information Security
    Vuorinen, Jukka
    Tetri, Pekka
    [J]. JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2012, 13 (09): : 695 - 713
  • [8] Information Security Ontology Model For Internet of Thing
    Ren, Weiwu
    Hu, Liang
    Zhao, Kuo
    Jia, Bing
    [J]. MANUFACTURING PROCESS AND EQUIPMENT, PTS 1-4, 2013, 694-697 : 2466 - +
  • [9] SIMOnt: A Security Information Management Ontology Framework
    Abulaish, Muhammad
    Nabi, Syed Irfan
    Alghathbar, Khaled
    Chikh, Azeddine
    [J]. SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 201 - +
  • [10] Generating a Standardized Upper Ontology for Security of Information and Networks
    Elci, Atilla
    [J]. COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, ICC3 2015, 2016, 412 : 27 - 32