Towards Real-Time Warning and Defense Strategy AI Planning for Cyber Security Systems Aided by Security Ontology
نویسندگان
چکیده
Cyber security systems generally have the phenomena of passive defense and low-efficiency early warnings. Aiming at above problems, this study proposes a real-time warning plans an AI strategy for cyber system aided by ontology. First, we design ontology that integrates attack graphs, general purpose domain-specific knowledge bases, on basis, (1) develop ontology-driven method warnings attacks, which supports non-intrusive scanning detection (2) combine artificial intelligence planning bounded rationality to recommend automatically execute strategies in conventional scenarios. A case has been performed, results indicate that: proposed can quickly analyze network traffic data warnings, is highly feasible ability implement autonomously, (3) performs best, with 5.4–11.4% increase effectiveness against state-of-the-art counterparts considering APT29 attack. Overall, holds potential cyberattacks under high computing resource constraints.
منابع مشابه
Formalizing Agents' Beliefs for Cyber-Security Defense Strategy Planning
Abstract. Critical information infrastructures have been exposed to an increasing number of cyber attacks in recent years. Current protection approaches consider the reaction to a threat from an operational perspective, but leave out human aspects of an attacker. The problem is, no matter how good a defense planning from an operational perspective is, it must be considered that any action taken...
متن کاملEnabling New Technologies for Cyber Security Defense with the ICAS Cyber Security Ontology
Distribution Statement ”A” (Approved for Public Release, Distribution Unlimited) Abstract—Incident response teams that are charged with breach discovery and containment face several challenges, the most important of which is access to pertinent data. Our TAPIO (Targeted Attack Premonition using Integrated Operational data) tool is designed to solve this problem by automatically extracting data ...
متن کاملTowards a Human Factors Ontology for Cyber Security
Traditional cybersecurity risk assessment is reactive and based on business risk assessment approach. The 2014 NIST Cybersecurity Framework provides businesses with an organizational tool to catalog cybersecurity efforts and areas that need additional support. As part of an on-going effort to develop a holistic, predictive cyber security risk assessment model, the characterization of human fact...
متن کاملCyber Security of Cyber Physical Systems: Cyber Threats and Defense of Critical Infrastructures
Most critical infrastructures such as the power grid, railway or air traffic control, industrial automation in manufacturing, water/sewage infrastructure, banking system, etc., are cyber physical systems (CPS). Since continued availability of the major functions of these are extremely important for economic and normal lives of people, there is a wide spread concern that these might come under i...
متن کاملTowards Real-time Wireless Cyber-physical Systems
One big challenge to be overcome before the successful deployment of wireless cyber-physical systems is to provide hard real-time guarantees, not only within the wireless network, but in fact between end-to-end application processes. To achieve this, we design a distributed real-time protocol (DRP) that considers the complete transmission chain, including application tasks, peripheral busses, m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2022
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics11244128