A knowledge-based approach to network security: applying Cyc in the domain of network risk assessment

作者: Zelal Güngördü , Cynthia Matuszek , Todd Hughes , C. Bruce Fraser , Blake Shepard

DOI:

关键词:

摘要: CycSecure™ is a network risk assessment and monitoring application that relies on knowledge-based artificial intelligence technologies to improve traditional vulnerability assessment. CycSecure integrates public reports of software faults from online databases, data gathered automatically computers hand-ontologized information about computer networks. This stored in the Cyc® knowledge base (KB) reasoned by Cyc inference engine planner provide detailed analyses security (and vulnerability)

参考文章(9)
Dana S. Nau, Yue Cao, Hector Muñoz-Avila, Amnon Lotem, SHOP: Simple Hierarchical Ordered Planner international joint conference on artificial intelligence. pp. 968- 975 ,(1999)
Howard E. Shrobe, Computational Vulnerability Analysis for Information Survivability Ai Magazine. ,vol. 23, pp. 81- 91 ,(2002) , 10.1609/AIMAG.V23I4.1671
John Douglas Howard, An analysis of security incidents on the Internet 1989-1995 Carnegie Mellon University. ,(1998)
William L. Fithen, Shawn V. Hernan, Paul F. O'Rourke, David A. Shinberg, Formal modeling of vulnerability Bell Labs Technical Journal. ,vol. 8, pp. 173- 186 ,(2004) , 10.1002/BLTJ.10094
Vladimir Gorodetski, Igor Kotenko, Attacks against computer network: formal grammar-based framework and simulation tool recent advances in intrusion detection. pp. 219- 238 ,(2002) , 10.1007/3-540-36084-0_12
Jeffrey Undercoffer, Anupam Joshi, John Pinkston, Modeling Computer Attacks: An Ontology for Intrusion Detection recent advances in intrusion detection. pp. 113- 135 ,(2003) , 10.1007/978-3-540-45248-5_7
U. Lindqvist, E. Jonsson, How to systematically classify computer security intrusions ieee symposium on security and privacy. pp. 154- 163 ,(1997) , 10.1109/SECPRI.1997.601330