skip to main content
10.1145/1852666.1852717acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

A security ontology for incident analysis

Published:21 April 2010Publication History

ABSTRACT

We have developed a new security incident ontology that considers organizations and their systems in their entirety, rather than software alone. This includes the corresponding defensive classes to the offensive incident categories, as adverse events should also be considered from the defender's viewpoint taking its goals and specific circumstances into account. We have created a three-layer security architecture comprising the social, logical and physical levels that allows the planning of comprehensive defensive measures with complete and reinforcing attack surfaces that span all levels. These ideas allow a holistic analysis of incidents, including human and physical factors, rather than from a technical viewpoint alone, that can give comprehensive defense-in-depth to prevent, detect or recover from incidents. We will use OWL to give a well-defined semantics to the ontology, which could be used to give a formal basis to security incidents.

Skip Supplemental Material Section

Supplemental Material

References

  1. M Howard (2004). "Attack surface: mitigate security risks by minimizing the code you expose to untrusted users". MSDN magazine (November 2004), at http://msdn.microsoft.com/en-us/magazine/cc163882.aspx.Google ScholarGoogle Scholar
  2. JR Boyd (1986). "Patterns of Conflict", at http://committeeofpublicsafety.files.wordpress.com/2009/11/poc.pdf. Updated version by C Spinney and C Richards (2007), at http://committeeofpublicsafety.files.wordpress.com/2009/11/patterns_ppt.pdf.Google ScholarGoogle Scholar
  3. C Blackwell (2010). "Improved Situational Awareness and Response with Enhanced OODA Loops". 6th CSIIR Workshop. ACM Press.Google ScholarGoogle Scholar
  4. PG Neumann and D Parker (1989). "A Summary of Computer Misuse Techniques". Proceedings of the 12th National Computer Security Conference.Google ScholarGoogle Scholar
  5. PG Neumann (2000). "Practical Architectures for Survivable Systems and Networks". SRI International, at www.csl.sri.com/neumann/survivability.pdf.Google ScholarGoogle Scholar
  6. JD Howard (1997). "An Analysis of Security Incidents on the Internet, 1989--1995". PhD thesis. Carnegie-Mellon University, at www.cert.org/research/JHThesis. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. JD Howard and TA Longstaff (1998). "A common language for computer security incidents". Sandia National Laboratories, at www.cert.org/research/taxonomy_988667.pdf.Google ScholarGoogle Scholar
  8. F Swiderski and W Snyder (2004). "Threat Modeling". Microsoft Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. W3C OWL Working Group (2009). "OWL 2 Web Ontology Language Document Overview". W3C (27 Oct 2009), at www.w3.org/TR/owl2-overview.Google ScholarGoogle Scholar
  10. MITRE. "Common Weaknesses Enumeration". The MITRE Corporation, available at http://cwe.mitre.org.Google ScholarGoogle Scholar

Index Terms

  1. A security ontology for incident analysis

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        CSIIRW '10: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
        April 2010
        257 pages
        ISBN:9781450300179
        DOI:10.1145/1852666

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 21 April 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader