Leveraging cyber threat intelligence for a dynamic risk framework

作者: R. Riesco , V. A. Villagrá

DOI: 10.1007/S10207-019-00433-2

关键词: Information exchangeDe facto standardSemantic Web Rule LanguageOntology languageComputer securityRisk management frameworkSemantic reasonerManagement processComputer scienceRisk management

摘要: One of the most important goals in an organization is to have risks under acceptance level along time. All organizations are exposed real-time security threats that could impact on their risk exposure levels harming entire organization, customers and reputation. New emerging techniques, tactics procedures (TTP) which remain undetected, complexity decentralization assets, great number vulnerabilities proportional new type devices (IoT) or still high false positives, only some examples real for any organization. Risk management frameworks not integrated automated with near (NRT) risk-related cybersecurity threat intelligence (CTI) information. The contribution this paper architecture based Web Ontology Language (OWL), a semantic reasoner use Semantic Rule (SWRL) approach Dynamic Assessment Management (DRA/DRM) framework at all (operational, tactic strategic). To enable such dynamic, NRT more realistic assessment processes, we created version STIX™v2.0 cyber as it becoming de facto standard structured information exchange. We selected international leading demonstrate dynamic ways support decision making while being attack. reasoners be our ideal partners fight against having control time, that, they need understand data. Our proposal uses unprecedented mix standards cover DRM ensure easier adoption by users.

参考文章(18)
Jorge E. López de Vergara, Víctor A. Villagrá, Pilar Holgado, Elena de Frutos, Iván Sanz, A Semantic Web Approach to Share Alerts among Security Information Management Systems Web Application Security. pp. 27- 38 ,(2010) , 10.1007/978-3-642-16120-9_14
Verónica Mateos Lanchas, Víctor A. Villagrá González, Francisco Romero Bueno, Ontologies-Based Automated Intrusion Response System Advances in Intelligent and Soft Computing. pp. 99- 106 ,(2010) , 10.1007/978-3-642-16626-6_11
Nahid Shahmehri, Claudiu Duma, Almut Herzog, An ontology for information security Information Science Reference. pp. 278- 301 ,(2009)
Almut Herzog, Nahid Shahmehri, Claudiu Duma, An Ontology of Information Security International Journal of Information Security and Privacy. ,vol. 1, pp. 1- 23 ,(2007) , 10.4018/JISP.2007100101
Stefan Fenz, Ontology-based generation of IT-security metrics Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10. pp. 1833- 1839 ,(2010) , 10.1145/1774088.1774478
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Simon Tjoa, and Thomas Muck, Integration of an Ontological Information Security Concept in Risk Aware Business Process Management hawaii international conference on system sciences. pp. 377- 377 ,(2008) , 10.1109/HICSS.2008.211
N. Poolsappasit, R. Dewri, I. Ray, Dynamic Security Risk Management Using Bayesian Attack Graphs IEEE Transactions on Dependable and Secure Computing. ,vol. 9, pp. 61- 74 ,(2012) , 10.1109/TDSC.2011.34
Andreas Ekelhart, Stefan Fenz, Markus Klemen, Edgar Weippl, Security Ontologies: Improving Quantitative Risk Analysis hawaii international conference on system sciences. pp. 156- ,(2007) , 10.1109/HICSS.2007.478
Cleotilde Gonzalez, Noam Ben-Asher, Alessandro Oltramari, Robert F. Erbacher, Ontology-based Adaptive Systems of Cyber Defense. STIDS. pp. 34- 41 ,(2015)
Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Xiaojing Liao, Alina Oprea, XiaoFeng Wang, Zhou Li, Catching predators at watering holes: finding and understanding strategically compromised websites annual computer security applications conference. pp. 153- 166 ,(2016) , 10.1145/2991079.2991112