Full Text:   <567>

Summary:  <91>

Suppl. Mater.: 

CLC number: TP393

On-line Access: 2024-08-27

Received: 2023-10-17

Revision Accepted: 2024-05-08

Crosschecked: 2024-09-29

Cited: 0

Clicked: 824

Citations:  Bibtex RefMan EndNote GB/T7714

 ORCID:

Dandan WU

https://orcid.org/0000-0001-5214-387X

-   Go to

Article info.
Open peer comments

Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.9 P.1209-1225

http://doi.org/10.1631/FITEE.2300662


OntoCSD: an ontology-based security model for an integrated solution of cyberspace defense


Author(s):  Dandan WU, Jie CHEN, Ruiyun XIE, Ke CHEN

Affiliation(s):  School of Computer Science, Chengdu College of University of Electronic Science and Technology of China, Chengdu 610731, China; more

Corresponding email(s):   wudd_2023@163.com

Key Words:  Cyberspace defense, Integrated solution, Ontology, Case-based reasoning (CBR), Computer network defense (CND)


Dandan WU, Jie CHEN, Ruiyun XIE, Ke CHEN. OntoCSD: an ontology-based security model for an integrated solution of cyberspace defense[J]. Frontiers of Information Technology & Electronic Engineering, 2024, 25(9): 1209-1225.

@article{title="OntoCSD: an ontology-based security model for an integrated solution of cyberspace defense",
author="Dandan WU, Jie CHEN, Ruiyun XIE, Ke CHEN",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="25",
number="9",
pages="1209-1225",
year="2024",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.2300662"
}

%0 Journal Article
%T OntoCSD: an ontology-based security model for an integrated solution of cyberspace defense
%A Dandan WU
%A Jie CHEN
%A Ruiyun XIE
%A Ke CHEN
%J Frontiers of Information Technology & Electronic Engineering
%V 25
%N 9
%P 1209-1225
%@ 2095-9184
%D 2024
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.2300662

TY - JOUR
T1 - OntoCSD: an ontology-based security model for an integrated solution of cyberspace defense
A1 - Dandan WU
A1 - Jie CHEN
A1 - Ruiyun XIE
A1 - Ke CHEN
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 25
IS - 9
SP - 1209
EP - 1225
%@ 2095-9184
Y1 - 2024
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.2300662


Abstract: 
The construction of an integrated solution for cyberspace defense with dynamic, flexible, and intelligent features is a new idea. To solve the problem whereby traditional static protection methods cannot respond to various network attacks or security demands in an adversarial network environment in time, and to form a complete integrated solution from “threat discovery” to “decision-making generation,” we propose an ontology-based security model, OntoCSD, for an integrated solution of cyberspace defense that uses Web ontology language (OWL) to represent the ontology classes and relationships of threat monitoring, decision-making, response, and defense in cyberspace, and uses semantic Web rule language (SWRL) to design the defensive reasoning rules. OntoCSD can discover potential relationships among network attacks, vulnerabilities, the security state, and defense strategies. Further, an artificial intelligence (AI) expert system based on case-based reasoning (CBR) is used to quickly generate a detailed and comprehensive decision-making scheme. Finally, through Kendall’s coefficient of concordance (W) and four experimental cases in a typical computer network defense (CND) system, which reasons on represented facts and the ontology, OntoCSD’s consistency and its feasibility to solve the issues in the field of cyberspace defense are validated. OntoCSD supports automatic association and reasoning, and provides an integrated solution framework of cyberspace defense.

OntoCSD:基于本体的网络空间防御综合解决方案安全模型

武丹丹1,陈捷2,3,谢瑞云3,陈轲1
1电子科技大学成都学院计算机学院,中国成都市,610731
2西北工业大学网络空间安全学院,中国西安市,710000
3中国电子科技网络信息安全有限公司,中国成都市,610000
摘要:构建动态、灵活、智能的网络空间防御综合解决方案是一种新理念。为了解决传统静态防护方法在网络对抗环境下无法及时响应各种网络攻击或安全需求的问题,形成从"威胁发现"到"决策生成"的完整集成解决方案,我们提出一种基于本体的安全模型-OntoCSD,该模型使用Web本体语言来表示网络空间威胁监测、决策、响应、防御过程中所涉及的本体类和关系,并使用语义Web规则语言来设计防御推理规则。OntoCSD可以发现网络攻击、漏洞、安全状态和防御策略之间的潜在关系。进一步地,利用基于案例推理的人工智能专家系统快速生成详细、全面的决策方案。最后,通过肯德尔一致性系数和典型计算机网络防御系统中四个基于表征事实和本体推理的实验案例,验证了OntoCSD解决网络空间防御领域问题的一致性和可行性。OntoCSD支持自动关联和推理,能够为网络空间防御提供整体解决方案框架。

关键词:网络空间防御;集成解决方案;本体;基于案例推理(CBR);计算机网络防御(CND)

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Reference

[1]Deng ZH, Lao SY, Bai L, et al., 2014. An extensible description model of cyber war system. J Natl Univ Def Technol, 36(1):184-190 (in Chinese).

[2]Gao JB, Zhang BW, Chen XH, 2012. Research progress in security ontology. Comput Sci, 39(8):14-19, 41 (in Chinese).

[3]Gong L, Si RB, Tian Y, 2020. Research on key technologies of ontology based threat modeling for cyber range. J CAEIT, 15(12):1139-1144, 1162 (in Chinese).

[4]Guo M, Qian HZ, Huang ZS, et al., 2014. Intelligent road-network selection using cases based reasoning. Acta Geod Cartograph Sin, 43(7):761-770 (in Chinese).

[5]Guo X, Qian HZ, Wang X, et al., 2021. A method of road network selection based on case and ontology reasoning. Acta Geod Cartograph Sin, 50(12):1717-1727 (in Chinese).

[6]Hameed S, Elsheikh Y, Azzeh M, 2023. An optimized case-based software project effort estimation using genetic algorithm. Inform Softw Technol, 153:107088.

[7]He HW, Qian HZ, Duan PX, et al., 2020. Automatic line simplification algorithm selecting and parameter setting based on case-based reasoning. Geomat Inform Sci Wuhan Univ, 45(3):344-352 (in Chinese).

[8]Hua HY, Chen QM, 2014. Network security situation knowledge base model based on ontology. J Comput Appl, 34(S2):95-98, 107 (in Chinese).

[9]Iannacone M, Bohn S, Nakamura G, et al., 2015. Developing an ontology for cyber security knowledge graphs. Proc 10th Annual Cyber and Information Security Research Conf, Article 12.

[10]Insaurralde CC, Blasch E, 2022. Situation awareness decision support system for air traffic management using ontological reasoning. J Aerosp Inform Syst, 19(3):224-245.

[11]Ji XS, Wu JX, Jin L, et al., 2022. Discussion on a new paradigm of endogenous security towards 6 G networks. Front Inform Technol Electron Eng, 23(10):1421-1450.

[12]Jia Y, Qi YL, Shang HJ, et al., 2018. A practical approach to constructing a knowledge graph for cybersecurity. Engineering, 4(1):53-60.

[13]Kiesling E, Ekelhart A, Kurniawan K, et al., 2019. The SEPSES knowledge graph: an integrated resource for cybersecurity. Proc 18th Int Semantic Web Conf, p.198-214.

[14]Li HL, Zhang ZH, 2022. Ontology-based knowledge management model for high-speed railway onboard equipment maintenance cases. Railw Stand Des, 66(2):‍149-155 (in Chinese).

[15]Liu B, Yi JC, Yao L, et al., 2023. Situational awareness ontology modeling for threat from space cyber operations. Syst Eng Electron, 45(3):745-754.

[16]Liu JX, Guo JX, Song LY, 2020. Study on cyberspace situation ontology for situation awareness. Fire Contr Command Contr, 45(3):90-94 (in Chinese).

[17]Liu ZJ, Sun Z, Chen JF, et al., 2020. STIX-based network security knowledge graph ontology modeling method. Proc 3rd Int Conf on Geoinformatics and Data Analysis, p.152-157.

[18]Ma HL, Wang L, Hu T, et al., 2022. Survey on the development of mimic defense in cyberspace: from mimic concept to "mimic+" ecology. Chin J Netw Inform Secur, 8(2):15-38 (in Chinese).

[19]Merah Y, Kenaza T, 2021. Proactive ontology-based cyber threat intelligence analytic. Int Conf on Recent Advances in Mathematics and Informatics, p.1-7.

[20]Nisha OSJ, Bhanu SMS, 2021. Detection of malicious Android applications using ontology-based intelligent model in mobile cloud environment. J Inform Secur Appl, 58:102751.

[21]Penadés MC, Borges MRS, Canós-Cerdá JH, et al., 2011. A product line approach to the development of advanced emergency plans. Proc 8th Int Conf on Information Systems for Crisis Response and Management.

[22]Qin PD, Xu WR, Wang WY, 2018. Robust distant supervision relation extraction via deep reinforcement learning. Proc 56th Annual Meeting of the Association for Computational Linguistics, p.2137-2147.

[23]Qin SZ, Chow KP, 2019. Automatic analysis and reasoning based on vulnerability knowledge graph. Proc Int Conf on Cyberspace Data and Intelligence, p.3-19.

[24]Si C, Zhang HQ, Wang YW, et al., 2015. Research on network security situational elements knowledge base model based on ontology. Comput Sci, 42(5):173-177 (in Chinese).

[25]Silva DV, Rafael GR, 2023. Ontology for data integration in honeynet. Res Milit, 13(2):4959-4972.

[26]Solic K, Ocevcic H, Golub M, 2015. The information systems’ security level assessment model based on an ontology and evidential reasoning approach. Comput Secur, 55:100-112.

[27]Zeng XR, He SZ, Liu K, et al., 2018. Large scaled relation extraction with reinforcement learning. Proc 32nd AAAI Conf on Artificial Intelligence, p.5658-5665.

[28]Zhang BW, Chang X, Li JH, 2020. A generalized information security model SOCMD for CMD systems. Chin J Electron, 29(3):417-426.

[29]Zhang L, 2012. Ontology-Based Digital Method and Application of Urban Rail Transit Emergency Plan. MS Thesis, Beijing Jiaotong University, Beijing, China (in Chinese).

[30]Zhang SQ, Bai GY, Li H, et al., 2022. IoT security knowledge reasoning method of multi-source data fusion. J Comput Res Dev, 59(12):2735-2749 (in Chinese).

[31]Zhang ZH, Li HL, Wang QW, et al., 2022. Ontology-based knowledge modeling of metro emergency response plan and construction of case database. Urban Mass Transit, 25(8):17-22 (in Chinese).

[32]Zhu X, Huang JM, Zhou B, et al., 2017. Real-time personalized twitter search based on semantic expansion and quality model. Neurocomputing, 254:13-21.

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE