Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1852666.1852756acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
poster

Building ontology of cybersecurity operational information

Published: 21 April 2010 Publication History

Abstract

Cyber threats come beyond the border of countries. However, most organizations are currently coping with them individually without global collaboration mainly due to the lack of global standard for cybersecurity information exchange format and framework. Albeit some countries possess their local standards to solve this problem, these standards are not orchestrated in order for each organization to fully collaborate each other. In order to build the basis of cybersecurity information exchange framework, this paper proposes an ontology of cybersecurity operational information. Based on the proposed ontology, it discusses on the coverage of existing cybersecurity information standards.

References

[1]
T. R. Gruber. Toward principles for the design of ontologies used for knowledge sharing. Int. J. Hum.-Comput. Stud., 43(5--6):907--928, 1995.
[2]
M. Casipe et al.t. The Open Checklist Interactive Language (OCIL) Version 1.1. MITRE TECHNICAL REPORT MTR080368 R3, May 2009.
[3]
P. Johansson et al. Failure to detect mismatches between intention and outcome in a simple decision task. Science, 310(5745):116, 2005.
[4]
R. Danyliw, et al. The Incident Object Description Exchange Format. IETF Request For Comments 5070, dec. 2007.
[5]
The MITRE Corporation. Common Weakness Scoring System (CWSS). http://cwe.mitre.org/cwss/index.html.
[6]
The MITRE Corporation. Making Security Measurable. http://msm.mitre.org/.

Cited By

View all
  • (2023)An Assessment of Capabilities Required for Effective Cybersecurity Incident Management - A Systematic Literature Review2023 International Conference on Data Security and Privacy Protection (DSPP)10.1109/DSPP58763.2023.10404318(1-11)Online publication date: 16-Oct-2023
  • (2022)Threat Actors’ Tenacity to Disrupt: Examination of Major Cybersecurity IncidentsIEEE Access10.1109/ACCESS.2022.323184710(134038-134051)Online publication date: 2022
  • (2022)A framework for conceptual characterization of ontologies and its application in the cybersecurity domainSoftware and Systems Modeling10.1007/s10270-022-01013-021:4(1437-1464)Online publication date: 2-Jul-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSIIRW '10: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
April 2010
257 pages
ISBN:9781450300179
DOI:10.1145/1852666
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 April 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cybersecurity
  2. information sharing
  3. ontology

Qualifiers

  • Poster

Conference

CSIIRW '10

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)An Assessment of Capabilities Required for Effective Cybersecurity Incident Management - A Systematic Literature Review2023 International Conference on Data Security and Privacy Protection (DSPP)10.1109/DSPP58763.2023.10404318(1-11)Online publication date: 16-Oct-2023
  • (2022)Threat Actors’ Tenacity to Disrupt: Examination of Major Cybersecurity IncidentsIEEE Access10.1109/ACCESS.2022.323184710(134038-134051)Online publication date: 2022
  • (2022)A framework for conceptual characterization of ontologies and its application in the cybersecurity domainSoftware and Systems Modeling10.1007/s10270-022-01013-021:4(1437-1464)Online publication date: 2-Jul-2022
  • (2020)Conceptual Characterization of Cybersecurity OntologiesThe Practice of Enterprise Modeling10.1007/978-3-030-63479-7_22(323-338)Online publication date: 18-Nov-2020
  • (2019)Information Sharing in Cybersecurity: A ReviewDecision Analysis10.1287/deca.2018.0387Online publication date: 6-Aug-2019
  • (2019)Preventing Poisoning Attacks On AI Based Threat Intelligence Systems2019 IEEE 29th International Workshop on Machine Learning for Signal Processing (MLSP)10.1109/MLSP.2019.8918803(1-6)Online publication date: Oct-2019
  • (2018)Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports2018 IEEE International Conference on Intelligence and Security Informatics (ISI)10.1109/ISI.2018.8587375(7-12)Online publication date: Nov-2018
  • (2017)ITAOFIR: IT Asset Ontology for Information Risk in Knowledge Economy and BeyondGlobal Security, Safety and Sustainability - The Security Challenges of the Connected World10.1007/978-3-319-51064-4_15(173-187)Online publication date: 4-Jan-2017
  • (2015)Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systemsProceedings of the 8th International Conference on Security of Information and Networks10.1145/2799979.2799995(142-149)Online publication date: 8-Sep-2015
  • (2010)Ontological approach toward cybersecurity in cloud computingProceedings of the 3rd international conference on Security of information and networks10.1145/1854099.1854121(100-109)Online publication date: 7-Sep-2010

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media