Using an Ontology for Network Attack Planning

Using an Ontology for Network Attack Planning

Renier van Heerden, Peter Chan, Louise Leenen, Jacques Theron
Copyright: © 2016 |Pages: 14
DOI: 10.4018/IJCWT.2016070106
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within the cyber domain. The amount of cyber information is increasing constantly and the time that information stays relevant and valuable in decreasing similarly. Thus semantic technologies can contribute towards the intelligent processing of information in this ever-changing environment. An ontology enables the representation of semantic information. In additional, automated reasoning can enrich the representation by inferring unknown relationships. The inferences that can be made with the automated reasoning capabilities of ontologies provide a unique insight into the relationships between network targets and attacks, compared to traditional databases.
Article Preview
Top

2. Background

This section gives an overview of ontologies, Command and Control and existing Network Attack ontologies. Finally we discuss the defences and advantages of Ontologies compared to databases.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing