Skip to main content
Log in

Ontology-based model of network and computer attacks for security assessment

  • Published:
Journal of Shanghai Jiaotong University (Science) Aims and scope Submit manuscript

Abstract

With increased cyber attacks over years, information system security assessment becomes more and more important. This paper provides an ontology-based attack model, and then utilizes it to assess the information system security from attack angle. We categorize attacks into a taxonomy suitable for security assessment. The proposed taxonomy consists of five dimensions, which include attack impact, attack vector, attack target, vulnerability and defense. Afterwards we build an ontology according to the taxonomy. In the ontology, attack related concepts included in the five dimensions and relationships between them are formalized and analyzed in detail. We also populate our attack ontology with information from national vulnerability database (NVD) about the vulnerabilities, such as common vulnerabilities and exposures (CVE), common weakness enumeration (CWE), common vulnerability scoring system (CVSS), and common platform enumeration (CPE). Finally we propose an ontology-based framework for security assessment of network and computer systems, and describe the utilization of ontology in the security assessment and the method for evaluating attack effect on the system when it is under attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Igure V M, Willams R D. Taxonomies of attacks and vulnerabilities in computer systems [J]. IEEE Communications Surveys, 2008, 10(1): 6–19.

    Article  Google Scholar 

  2. Howard J D, Longstaff T A. A common language for computer security incidents [R]. California: Sandia National Laboratories, 1998.

    Book  Google Scholar 

  3. Alvarez G, Petrovic S. A taxonomy of Web attacks suitable for efficient encoding [J]. Computer & Security, 2003, 22(5): 435–449.

    Article  Google Scholar 

  4. Hansman S, Hunt R. A taxonomy of network and computer attacks [J]. Computers & Security, 2005, 24(1): 31–43.

    Article  Google Scholar 

  5. Simmons C, Ellis C, Shiva S, et al. AVOIDIT: A cyber attack taxonomy [R]. Memphis: University of Memphis, 2009.

    Google Scholar 

  6. Raskin V, Hempelmann C F, Triezenberg K E, et al. Ontology in information security: A useful theoretical foundation and methodological tool [C]//Proceedings of the 2001 Workshop on New Security Paradigms. New York: NSPW, 2001: 53–59.

    Chapter  Google Scholar 

  7. Beitollahi H, Deconinck G. Analyzing well-known countermeasures against distributed denial of service attacks [J]. Computer Communications, 2012, 35(11): 1312–1332.

    Article  Google Scholar 

  8. Simmonds A, Sandilands P, Ekert L V. An ontology for network security attacks [C]//Proceedings of Second Asian Applied Computing Conference. Kathmandu, Nepal: AACC, 2004: 317–323.

    Google Scholar 

  9. Wang J A, Guo M M, Camargo J. An ontological approach to computer system security [J]. Information Security Journal: A Global Perspective, 2010, 19(2): 61–73.

    Article  Google Scholar 

  10. Venter H S, Eloff J H P. A taxonomy for information security technologies [J]. Computers & Security, 2003, 22(4): 299–307.

    Article  Google Scholar 

  11. Herzog A, Shahmehri N, Duma C. An ontology of information security [J]. International Journal of Information Security and Privacy, 2007, 1(4): 1–23.

    Article  Google Scholar 

  12. Noy N F, Mc-Guinness D L. Ontology development 101: A guide to creating your first ontology [R]. Stanford: Stanford Knowledge Systems Laboratory, 2001.

    Google Scholar 

  13. Blanco C, Lasheras J, Fernandez-Medina E. Basis for an integrated security ontology according to a systematic review of existing proposals [J]. Computers Standards & Interfaces, 2011, 33(4): 372–388.

    Article  Google Scholar 

  14. Baader F, Calvanese D, Mc-Guinness D L, et al. Description logic handbook: Theory, implementation and application [M]. Cambridge, UK: Cambridge University Press, 2003.

    Google Scholar 

  15. Gruber T. Towards principles for the design of ontologies used for knowledge sharing [J]. International Journal of Human-Computer Studies, 1995, 43(5–6): 907–928.

    Article  Google Scholar 

  16. Vargas L G, Dougherty J J. The analytic hierarchy process and multicriterion decision making [J]. American Journal of Mathematical and Management Sciences, 1982, 19(1): 59–92.

    Article  Google Scholar 

  17. Holm H. Performance of automated network vulnerability scanning at remediating security issues [J]. Computers & Security, 2012, 31(2): 164–175.

    Article  Google Scholar 

  18. Hu Ying, Xian Ming, Xiao Shun-ping. Design of a DoS attack effect evaluation system [J]. Computer Engineering & Science, 2005, 27(2): 15–22 (in Chinese).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bao-wen Zhang  (张保稳).

Additional information

Foundation item: the National Basic Research Program (973) of China (No. 2010CB731403), the Information Network Security Key Laboratory Open Project of the Ministry of Public Security of China (No. C09603), and the Shanghai Key Scientific and Technological Project (No. 11511504302)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Gao, Jb., Zhang, Bw., Chen, Xh. et al. Ontology-based model of network and computer attacks for security assessment. J. Shanghai Jiaotong Univ. (Sci.) 18, 554–562 (2013). https://doi.org/10.1007/s12204-013-1439-5

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12204-013-1439-5

Key words

CLC number

Navigation