- -

Conceptual Characterization of Cybersecurity Ontologies

RiuNet: Repositorio Institucional de la Universidad Politécnica de Valencia

Compartir/Enviar a

Citas

Estadísticas

  • Estadisticas de Uso

Conceptual Characterization of Cybersecurity Ontologies

Mostrar el registro sencillo del ítem

Ficheros en el ítem

dc.contributor.author Martins, Beatriz F. es_ES
dc.contributor.author Serrano-Gil, Lenin Javier es_ES
dc.contributor.author REYES ROMÁN, JOSÉ FABIÁN es_ES
dc.contributor.author Panach, José Ignacio es_ES
dc.contributor.author Pastor López, Oscar es_ES
dc.contributor.author Rochwerger, Benny es_ES
dc.date.accessioned 2022-01-07T07:40:26Z
dc.date.available 2022-01-07T07:40:26Z
dc.date.issued 2020-11-27 es_ES
dc.identifier.isbn 978-3-030-63479-7 es_ES
dc.identifier.issn 1865-1356 es_ES
dc.identifier.uri http://hdl.handle.net/10251/179350
dc.description.abstract [EN] Cybersecurity is known as the practice of protecting systems from digital attacks. Organizations are seeking efficient solutions for the management and protection of their assets. It is a complex issue, especially for great enterprises, because it requires an interdisciplinary approach. The kinds of problems enterprises must deal with and this domain complexity induces misinterpretations and misunderstandings about the concepts and relations in question. This article focus on dealing with Cybersecurity from an ontological perspective. The first contribution is a search of previously existing works that have defined Cybersecurity Ontologies. The paper describes the process to search these works. The second contribution of the paper is the definition of characteristics to classify the papers of Cybersecurity Ontologies previously found. This classification aims to compare the previous works with the same criteria. The third contribution of the paper is the analysis of the results of the comparison of previous works in the field of Cybersecurity Ontologies. Moreover, the paper discusses the gaps found and proposes good practice actions in Ontology Engineering for this domain. The article ends with some next steps proposed in the evolution towards a pragmatic and iterative solution that meets the needs of organizations. es_ES
dc.language Inglés es_ES
dc.publisher Springer es_ES
dc.relation.ispartof The Practice of Enterprise Modeling. 13th IFIP Working Conference, PoEM 2020, Riga, Latvia, November 25-27, 2020, Proceedings es_ES
dc.relation.ispartofseries Lecture Notes in Business Information Processing;400 es_ES
dc.rights Reserva de todos los derechos es_ES
dc.subject Cybersecurity es_ES
dc.subject Ontology es_ES
dc.subject Knowledge graphs es_ES
dc.subject Organizations es_ES
dc.subject Enterprise architecture es_ES
dc.subject.classification LENGUAJES Y SISTEMAS INFORMATICOS es_ES
dc.title Conceptual Characterization of Cybersecurity Ontologies es_ES
dc.type Comunicación en congreso es_ES
dc.type Artículo es_ES
dc.type Capítulo de libro es_ES
dc.identifier.doi 10.1007/978-3-030-63479-7_22 es_ES
dc.rights.accessRights Abierto es_ES
dc.contributor.affiliation Universitat Politècnica de València. Departamento de Sistemas Informáticos y Computación - Departament de Sistemes Informàtics i Computació es_ES
dc.contributor.affiliation Universitat Politècnica de València. Centro de Investigación en Métodos de Producción de Software - Centre d'Investigació en Mètodes de Producció de Software es_ES
dc.description.bibliographicCitation Martins, BF.; Serrano-Gil, LJ.; Reyes Román, JF.; Panach, JI.; Pastor López, O.; Rochwerger, B. (2020). Conceptual Characterization of Cybersecurity Ontologies. Springer. 323-338. https://doi.org/10.1007/978-3-030-63479-7_22 es_ES
dc.description.accrualMethod S es_ES
dc.relation.conferencename 13th IFIP WG 8.1 working conference on the Practice of Enterprise Modelling (PoEM 2020) es_ES
dc.relation.conferencedate Noviembre 25-27,2020 es_ES
dc.relation.conferenceplace Riga, Latvia es_ES
dc.relation.publisherversion https://doi.org/10.1007/978-3-030-63479-7_22 es_ES
dc.description.upvformatpinicio 323 es_ES
dc.description.upvformatpfin 338 es_ES
dc.type.version info:eu-repo/semantics/publishedVersion es_ES
dc.relation.pasarela S\422927 es_ES
dc.description.references Baader, F., et al.: The Description Logic Handbook: Theory, Implementation and Applications. Cambridge University Press, Cambridge (2003) es_ES
dc.description.references Ben-Asher, N., Oltramari, A., Erbacher, R.F., Gonzalez, C.: Ontology-based adaptive systems of cyber defense. In: STIDS. pp. 34–41 (2015) es_ES
dc.description.references Bergner, S., Lechner, U.: Cybersecurity ontology for critical infrastructures. In: KEOD. pp. 80–85 (2017) es_ES
dc.description.references Bizer, C., Heath, T., Berners-Lee, T.: Linked data:the story so far. In: Semantic Services, Interoperability and Web Applications: Emerging Concepts. pp. 205–227. IGI Global (2011) es_ES
dc.description.references Blanco, C., Lasheras, J., Valencia-García, R., Fernández-Medina, E., Toval, A., Piattini, M.: A systematic review and comparison of security ontologies. In: 3th International Conference on Availability, Reliability and Security. pp. 813–820. IEEE (2008) es_ES
dc.description.references Booth, H., Turner, C.: Vulnerability description ontology (vdo). A Framework for Characterizing Vulnerabilities, NIST (2016) es_ES
dc.description.references Borgo, S., Masolo, C.: Ontological foundations of dolce. In: Poli, R., Healy, M., Kameas, A., (eds.) Theory and Applications of Ontology: Computer Applications. Springer, Dordrecht (2010) https://doi.org/10.1007/978-90-481-8847-5_13 es_ES
dc.description.references Degen, W., Heller, B., Herre, H., Smith, B.: Gol: toward an axiomatized upper-level ontology. In: Proceedings of the International Conference on Formal Ontology in Information Systems-Volume. pp. 34–46 (2001) es_ES
dc.description.references Dietz, M., Putz, B., Pernul, G.: A distributed ledger approach to digital twin secure data sharing. In: IFIP Annual Conference on Data and Applications Security and Privacy. pp. 281–300. Springer (2019)https://doi.org/10.1007/978-3-030-22479-0_15 es_ES
dc.description.references Elnagdy, S.A., Qiu, M., Gai, K.: Cyber incident classifications using ontology-based knowledge representation for cybersecurity insurance in financial industry. In: 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud). pp. 301–306. IEEE (2016) es_ES
dc.description.references Falbo, R.D.A.: SABiO: Systematic Approach for Building Ontologies. In: Proceedings of the 1st Joint Workshop ONTO.COM/ODISE on Ontologies in Conceptual Modeling and Information Systems Engineering (2014) es_ES
dc.description.references Fernández-López, M., Gómez-Pérez, A., Juristo, N.: Methontology: from ontological art towards ontological engineering. In: Proceedings of the Ontological Engineering AAAI-97 Spring Symposium Series. American Association for Artificial Intelligence (1997) es_ES
dc.description.references Finkel, J.R., Grenager, T., Manning, C.: Incorporating non-local information into information extraction systems by gibbs sampling. In: Proceedings of the 43rd Annual Meeting on Association for Computational Linguistics. ACL 2005, p. 363–370. USA (2005) es_ES
dc.description.references Giaretta, P., Guarino, N.: Ontologies and knowledge bases towards a terminological clarification. Towards very large knowledge bases: knowledge building & knowledge sharing 25, 32 (1995) es_ES
dc.description.references Grégio, A., Bonacin, R., Nabuco, O., Afonso, V.M., De Geus, P.L., Jino, M.: Ontology for malware behavior: a core model proposal. In: 2014 IEEE 23rd International WETICE Conference. pp. 453–458. IEEE (2014) es_ES
dc.description.references Guarino, N.: Formal ontology in information systems. In: Proceedings of the 1st International Conference. pp. 6–8. IOS Press, Trento, Italy (1998) es_ES
dc.description.references Guarino, N.: The ontological level. Philosophy and the Cognitive Sciences (1994) es_ES
dc.description.references Guizzardi, G.: The role of foundational ontology for conceptual modeling and domain ontology representation, keynote paper. In: 7th International Baltic Conference on Databases and Information Systems (DB&IS), Vilnius, IEEE Press (2006) es_ES
dc.description.references Guizzardi, G.: Ontological Foundations for Structural Conceptual Models. CTIT, Centre for Telematics and Information Technology (2005) es_ES
dc.description.references Guizzardi, G.: On ontology, ontologies, conceptualizations, modeling languages, and (meta) models. Front. Artif. Intell. Appl. 155, 18 (2007) es_ES
dc.description.references Guizzardi, G., Ferreira Pires, L., van Sinderen, M.: An ontology-based approach for evaluating the domain appropriateness and comprehensibility appropriateness of modeling languages. In: Briand, L., Williams, C. (eds.) MODELS 2005. LNCS, vol. 3713, pp. 691–705. Springer, Heidelberg (2005). https://doi.org/10.1007/11557432_51 es_ES
dc.description.references Hadar, E., Hassanzadeh, A.: Big data analytics on cyber attack graphs for prioritizing agile security requirements. In: 2019 IEEE 27th International Requirements Engineering Conference (RE). pp. 330–339. IEEE (2019) es_ES
dc.description.references Herre, H.: General formal ontology (gfo): a foundational ontology for conceptual modelling. In: Poli, R., Healy, M., Kameas, A. (eds) Theory and Applications of Ontology: Computer Applications. Springer, Dordrecht (2010) https://doi.org/10.1007/978-90-481-8847-5_14 es_ES
dc.description.references Horrocks, I., et al.: Daml+oil: a description logic for the semantic web. IEEE Data Eng. Bull. 25(1), 4–9 (2002) es_ES
dc.description.references Iannacone, M., et al.: Developing an ontology for cyber security knowledge graphs. In: 10th Annual Cyber and Information Security Research Conference (2015) es_ES
dc.description.references Jia, Y., Qi, Y., Shang, H., Jiang, R., Li, A.: A practical approach to constructing a knowledge graph for cybersecurity. Engineering 4(1), 53–60 (2018) es_ES
dc.description.references Kang, D., Lee, J., Choi, S., Kim, K.: An ontology-based enterprise architecture. Expert Syst. Appl. 37(2), 1456–1464 (2010) es_ES
dc.description.references Keil, J.M., Schindler, S.: Comparison and evaluation of ontologies for units of measurement. Semantic Web 10(1), 33–51 (2019) es_ES
dc.description.references Mascardi, V., Cordì, V., Rosso, P.: A comparison of upper ontologies. In: Woa. vol. 2007, pp. 55–64 (2007) es_ES
dc.description.references Mozzaquatro, B.A., Agostinho, C., Goncalves, D., Martins, J., Jardim-Goncalves, R.: An ontology-based cybersecurity framework for the internet of things. Sensors 18(9), 3053 (2018) es_ES
dc.description.references Mundie, D.A., Ruefle, R., Dorofee, A.J., Perl, S.J., McCloud, J., Collins, M.: An incident management ontology. In: STIDS. pp. 62–71 (2014) es_ES
dc.description.references Narayanan, S., Ganesan, A., Joshi, K., Oates, T., Joshi, A., Finin, T.: Cognitive techniques for early detection of cybersecurity events. arXiv preprint arXiv:1808.00116 (2018) es_ES
dc.description.references Obrst, L., Chase, P., Markeloff, R.: Developing an ontology of the cyber security domain. In: STIDS. pp. 49–56 (2012) es_ES
dc.description.references Oltramari, A., Cranor, L.F., Walls, R.J., McDaniel, P.: Computational ontology of network operations. In: MILCOM 2015–2015 IEEE Military Communications Conference. pp. 318–323. IEEE (2015) es_ES
dc.description.references Oltramari, A., Cranor, L.F., Walls, R.J., McDaniel, P.D.: Building an ontology of cyber security. In: STIDS. pp. 54–61. Citeseer (2014) es_ES
dc.description.references Oltramari, A., Henshel, D.S., Cains, M., Hoffman, B.: Towards a human factors ontology for cyber security. In: STIDS. pp. 26–33 (2015) es_ES
dc.description.references Oltramari, A., Vetere, G., Lenzerini, M., Gangemi, A., Guarino, N.: Senso comune. In: LREC (2010) es_ES
dc.description.references Onwubiko, C.: Cocoa: An ontology for cybersecurity operations centre analysis process. In: 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). pp. 1–8 (2018) es_ES
dc.description.references Ou, X., Govindavajhala, S., Appel, A.W.: Mulval: A logic-based network security analyzer. In: USENIX security symposium. vol. 8, pp. 113–128. Baltimore (2005) es_ES
dc.description.references Parmelee, M.C.: Toward an ontology architecture for cyber-security standards. STIDS 713, 116–123 (2010) es_ES
dc.description.references Pipa, A.M.C.: OWL ontology quality assessment and optimization in the cybersecurity domain. Ph.D. thesis, Instituto Universitário de Lisboa (2018) es_ES
dc.description.references Rose, S., Engel, D., Cramer, N., Cowley, W.: Automatic keyword extraction from individual documents. In: Berry, M.W., Kogan, J. (eds.) Text Mining. Applications and Theory, pp. 1–20. John Wiley and Sons, Ltd (2010) es_ES
dc.description.references Rutkowski, A., et al.: Cybex: The cybersecurity information exchange framework (x.1500). SIGCOMM Comput. Commun. Rev. 40(5), 59–64 (2010) es_ES
dc.description.references Sikos, L.F.: OWL ontologies in cybersecurity: conceptual modeling of cyber-knowledge. In: Sikos, L.F. (ed.) AI in Cybersecurity. ISRL, vol. 151, pp. 1–17. Springer, Cham (2019). https://doi.org/10.1007/978-3-319-98842-9_1 es_ES
dc.description.references Singhal, A., Ou, X.: Security risk analysis of enterprise networks using probabilistic attack graphs. Network Security Metrics, pp. 53–73. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66505-4_3 es_ES
dc.description.references Syed, R., Zhong, H.: Cybersecurity vulnerability management: An ontology-based conceptual model (2018) es_ES
dc.description.references Syed, Z., Padia, A., Finin, T., Mathews, L., Joshi, A.: UCO: A unified cybersecurity ontology. In: Workshops at the Thirtieth AAAI Conference on Artificial Intelligence (2016) es_ES
dc.description.references Takahashi, T., Kadobayashi, Y.: Reference ontology for cybersecurity operational information. Comput. J. 58(10), 2297–2312 (2015) es_ES
dc.description.references Takahashi, T., Fujiwara, H., Kadobayashi, Y.: Building ontology of cybersecurity operational information. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information intelligence Research. pp. 1–4 (2010) es_ES
dc.description.references Takahashi, T., Kadobayashi, Y.: Cybersecurity information exchange techniques: Cybersecurity information ontology and cybex. J. National Instit. Inf. Commun. Technol. 58(3/4), 127–135 (2011) es_ES
dc.description.references Takahashi, T., Kadobayashi, Y., Fujiwara, H.: Ontological approach toward cybersecurity in cloud computing. In: Proceedings of the 3rd International Conference on Security of Information and Networks. pp. 100–109 (2010) es_ES
dc.description.references Undercofer, J., Joshi, A., Finin, T., Pinkston, J., et al.: A target-centric ontology for intrusion detection. In: Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence (2003) es_ES
dc.description.references Wand, Y., Weber, R.: On the deep structure of information systems. Inf. Syst. J. 5(3), 203–223 (1995) es_ES
dc.description.references Wang, J.Z., Ali, F.: An efficient ontology comparison tool for semantic web applications. In: The 2005 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2005). pp. 372–378. IEEE (2005) es_ES
dc.description.references Wang, J.A., Guo, M.: Ovm: an ontology for vulnerability management. In: 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies. pp. 1–4 (2009) es_ES
dc.description.references Wieringa, R.: Design Science Methodology for Information Systems and Software Engineering. Springer, Berlin (2014) es_ES
dc.description.references Zuanelli, E.: The cybersecurity ontology platform: the poc solution. e-AGE2017 p. 1 (2017) es_ES


Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem