skip to main content
10.1145/2746266.2746278acmotherconferencesArticle/Chapter ViewAbstractPublication PagescisrcConference Proceedingsconference-collections
short-paper

Developing an Ontology for Cyber Security Knowledge Graphs

Published:07 April 2015Publication History

ABSTRACT

In this paper we describe an ontology developed for a cyber security knowledge graph database. This is intended to provide an organized schema that incorporates information from a large variety of structured and unstructured data sources, and includes all relevant concepts within the domain. We compare the resulting ontology with previous efforts, discuss its strengths and limitations, and describe areas for future work.

References

  1. Stucco: Situation and Threat Understanding by Correlating Contextual Observations. https://stucco.github.io/, 2015.Google ScholarGoogle Scholar
  2. T. Aslam, I. Krsul, and E. H. Spafford. Use of a taxonomy of security faults. 1996.Google ScholarGoogle Scholar
  3. S. Barnum. Standardizing cyber threat intelligence information with the structured threat information expression (stix). MITRE Corporation, page 11, 2014.Google ScholarGoogle Scholar
  4. C. Blanco, J. Lasheras, R. Valencia-García, E. Fernández-Medina, A. Toval, and M. Piattini. A systematic review and comparison of security ontologies. In Availability, Reliability and Security, 2008. ARES 08. Third International Conference on, pages 813--820. IEEE, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. A. Bridges, C. L. Jones, M. D. Iannacone, K. M. Testa, and J. R. Goodall. Automatic labeling for entity extraction in cyber security. arXiv preprint arXiv:1308.4941, 2013.Google ScholarGoogle Scholar
  6. G. A. Fink, V. Duggirala, R. Correa, and C. North. Bridging the host-network divide: Survey, taxonomy, and solution. In LISA, pages 247--262, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. Hansman and R. Hunt. A taxonomy of network and computer attacks. Computers & Security, 24(1):31--43, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. D. Howard and T. A. Longstaff. A common language for computer security incidents. Sandia National Laboratories, 1998.Google ScholarGoogle Scholar
  9. V. Igure and R. Williams. Taxonomies of attacks and vulnerabilities in computer systems. Communications Surveys & Tutorials, IEEE, 10(1):6--19, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C. L. Jones, R. A. Bridges, K. M. T. Huffer, and J. R. Goodall. Towards a relation extraction framework for cyber-security concepts. In Proceedings of the CISRC-10, the tenth Cyber & Information Security Research Conference. ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Joshi, R. Lal, and T. Finin. Extracting cybersecurity related linked data from text. In Semantic Computing (ICSC), 2013 IEEE Seventh International Conference on, pages 252--259. IEEE, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. K. S. Killourhy, R. A. Maxion, and K. M. Tan. A defense-centric taxonomy based on attack manifestations. In Dependable Systems and Networks, 2004 International Conference on, pages 102--111. IEEE, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C. E. Landwehr, A. R. Bull, J. P. McDermott, and W. S. Choi. A taxonomy of computer program security flaws. ACM Computing Surveys (CSUR), 26(3):211--254, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. U. Lindqvist and E. Jonsson. How to systematically classify computer security intrusions. In Security and Privacy, 1997. Proceedings., 1997 IEEE Symposium on, pages 154--163. IEEE, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. N. McNeil, R. Bridges, M. Iannacone, B. Czejdo, N. Perez, and J. Goodall. Pace: Pattern accurate computationally efficient bootstrapping for timely discovery of cyber-security concepts. In Machine Learning and Applications (ICMLA), 2013 12th International Conference on, volume 2, pages 60--65. Dec 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. C. Meyers, S. Powers, and D. Faissol. Taxonomies of cyber adversaries and attacks: a survey of incidents and approaches. Lawrence Livermore National Laboratory, 7, 2009.Google ScholarGoogle Scholar
  17. S. More, M. Matthews, A. Joshi, and T. Finin. A knowledge-based approach to intrusion detection modeling. In Security and Privacy Workshops (SPW), 2012 IEEE Symposium on, pages 75--81. IEEE, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. V. Mulwad, W. Li, A. Joshi, T. Finin, and K. Viswanathan. Extracting information about security vulnerabilities from web text. In Web Intelligence and Intelligent Agent Technology (WI-IAT), 2011 IEEE/WIC/ACM International Conference on, volume 3, pages 257--260. IEEE, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. L. Obrst, P. Chase, and R. Markeloff. Developing an ontology of the cyber security domain. In STIDS, pages 49--56, 2012.Google ScholarGoogle Scholar
  20. M. C. Parmelee. Toward an ontology architecture for cyber-security standards. STIDS, 713:116--123, 2010.Google ScholarGoogle Scholar
  21. R. C. Seacord and A. D. Householder. A structured approach to classifying security vulnerabilities. Technical report, DTIC Document, 2005.Google ScholarGoogle Scholar
  22. J. Undercoffer, A. Joshi, and J. Pinkston. Modeling computer attacks: An ontology for intrusion detection. In Recent Advances in Intrusion Detection, pages 113--135. Springer, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  23. S. Weber, P. A. Karger, and A. Paradkar. A software flaw taxonomy: aiming tools at security. In ACM SIGSOFT Software Engineering Notes, volume 30, pages 1--7. ACM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Developing an Ontology for Cyber Security Knowledge Graphs

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CISR '15: Proceedings of the 10th Annual Cyber and Information Security Research Conference
      April 2015
      99 pages
      ISBN:9781450333450
      DOI:10.1145/2746266

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 April 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • short-paper
      • Research
      • Refereed limited

      Acceptance Rates

      CISR '15 Paper Acceptance Rate18of36submissions,50%Overall Acceptance Rate69of136submissions,51%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader