期刊文献+

基于安全本体的协同报警分析研究

Collaborative Alert Analysis Based on Security Ontology
在线阅读 下载PDF
导出
摘要 用户的网络管理需要建立一种新型的综合网络安全管理解决方案,即统一网络安全管理。关注其中的一个关键功能——协同报警分析,在把握现有研究方向的基础上,提出一个网络安全报警分析基本框架。现今存在的主要问题在于如何保证安全报警的环境资产信息、背景知识与攻击知识的统一表达。目前,针对这一问题仍缺乏一个实践可行的有效方法,这将直接影响到统一网络安全管理的最终实现。在协同报警分析过程中引入CIM模式扩展的OWL+SWRL安全本体来统一表达信息与知识,并提出一个极具潜力的方法用以完善现有协同报警分析技术,作为实现统一网络安全管理的重要步骤。 Network users need a new integrated solution for network security management, or in other words, unified network security management. This paper discussed collaborative alert analysis, which is one of its key functionalities, and based on a sufficient understanding of research direction,a basic network security alert analysis model was then provided. As for collaborative alert analysis, the main problem is how to guarantee unified representation of context information, background knowledge and attack knowledge for security alerts. And the fact is that, a practical and efficient app- roach is still lacking these days,which influents the realization of unified network security management. This paper introduced the use of security ontology by means of OWL+SWRL based on CIM Schema for unified representation of information and knowledge, and aimed at proposing a promising approach to improve existing collaborative alert analysis techniques as an important stage to realize unified network security management.
出处 《计算机科学》 CSCD 北大核心 2009年第5期104-107,157,共5页 Computer Science
基金 湖北省科技攻关重大项目(2004AA103A01) 武汉市科技攻关计划项目(200710421130)资助
关键词 网络安全 报警分析 协同 安全本体 Network security,Alert analysis,Collaboration,Security ontology
  • 相关文献

参考文献9

  • 1Debar H,Curry D,Feinstein B.The Intrusion Detection Message Exchange Format (IDMEF).RFC4765,2007
  • 2Tsoumas B,Gritzalis D.Towards an Ontology-based Security Management[A]ffProceeding of 20th International Conference on Advanced Information Networking and Applications[C].Washington,DC:IEEE Press,2006:985-992
  • 3Patel-schneider P F,Hayes P,Horrocks L OWL Web Ontology Language Somantics and Abstract Syntax.W3C Recommendation,2004
  • 4Pras A,et al.Key Research Challenges in Network Management[J].IEEE Communications Magazine,2007,45 (10):104-110
  • 5Noy N,McGuiness D.Ontology Development 101:A Guide to Creating Your First Ontology[R].No.KSL-01-05.Palo Alto:Knowledge Systems,AI Laboratory,Stanford University,2001
  • 6Holsspple C,Joshi K.A Collaborative Approach to Ontology Design[J].Communication of the ACM,2002,45 (2):42-47
  • 7Quirolgico S,Assis A,Westerinen A,et al.Toward a Formal Common Information Model Ontology[A]//Bussler C,et al.,eds.Web Information Systems-WISE 2004 Workshops,Lecture Note in Computer Science 3307[C].Berlin:Springer,2004:11-21
  • 8Horrocks I,et al.SWRL:A Semantic Web Rule Language Combining OWL and RuleML.W3C Member Submission,2004
  • 9卢继军,黄刘生,吴树峰.基于攻击树的网络攻击建模方法[J].计算机工程与应用,2003,39(27):160-163. 被引量:22

二级参考文献14

  • 1B Schneier.Attack Trees:Modeling Security Threats[J].Dr Dobb's Journal, 1999.
  • 2G Helmer,J Wong,Mark Slagell et al.A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System[C].In:Symposium on Requirements Engineering for Information Security,2001-03.
  • 3M Howard,D LeBlanc.Writing Secure Code[M].Microsoft Press,2001.
  • 4F Moberg.Security Analysis of an Information System Using an Attack Tree-Based Methodology[D].Master's Thesis.Department of Computer Engineering,Chalmers University of Technology,Sweden,2000.
  • 5A P Moore,R J Ellison,R C Linger.Attack Modeling for Information Security and Survivability,CMU SEI Technical Note,2001-03.
  • 6D Ruiu.Cautionary Tales : Stealth Coordinated Attack Howto, Digital Mogul 2-7,1999-07.
  • 7COMMON CRITERIA IMPLEMENTATION BOARD.Common Criteria for Information Technology Security Evaluation,version 2.1.Common Criteria Project Sponsoring Organizations, 1999-08.
  • 8J Howard.An Analysis of Security Incidents on the Internet,1989-1995. PhD Dissertation.Department of Engineering and Public Policy,Carnegie Mellon University,Pittsburgh,Pennsylvania, 1997.
  • 9A D Korzyk.A Forecasting Model For Intemet Security Attacks[C]. In : 21^st National Information Systems Security Conference, Arlington, Virginia,USA, 1998-10.
  • 10F Cohen.Simulating Cyber Attacks,Defenses and Consequences[J]. Computers & Security, 1999; (18) :479-518.

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部