Towards Real-Time Warning and Defense Strategy AI Planning for Cyber Security Systems Aided by Security Ontology

نویسندگان

چکیده

Cyber security systems generally have the phenomena of passive defense and low-efficiency early warnings. Aiming at above problems, this study proposes a real-time warning plans an AI strategy for cyber system aided by ontology. First, we design ontology that integrates attack graphs, general purpose domain-specific knowledge bases, on basis, (1) develop ontology-driven method warnings attacks, which supports non-intrusive scanning detection (2) combine artificial intelligence planning bounded rationality to recommend automatically execute strategies in conventional scenarios. A case has been performed, results indicate that: proposed can quickly analyze network traffic data warnings, is highly feasible ability implement autonomously, (3) performs best, with 5.4–11.4% increase effectiveness against state-of-the-art counterparts considering APT29 attack. Overall, holds potential cyberattacks under high computing resource constraints.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formalizing Agents' Beliefs for Cyber-Security Defense Strategy Planning

Abstract. Critical information infrastructures have been exposed to an increasing number of cyber attacks in recent years. Current protection approaches consider the reaction to a threat from an operational perspective, but leave out human aspects of an attacker. The problem is, no matter how good a defense planning from an operational perspective is, it must be considered that any action taken...

متن کامل

Enabling New Technologies for Cyber Security Defense with the ICAS Cyber Security Ontology

Distribution Statement ”A” (Approved for Public Release, Distribution Unlimited) Abstract—Incident response teams that are charged with breach discovery and containment face several challenges, the most important of which is access to pertinent data. Our TAPIO (Targeted Attack Premonition using Integrated Operational data) tool is designed to solve this problem by automatically extracting data ...

متن کامل

Towards a Human Factors Ontology for Cyber Security

Traditional cybersecurity risk assessment is reactive and based on business risk assessment approach. The 2014 NIST Cybersecurity Framework provides businesses with an organizational tool to catalog cybersecurity efforts and areas that need additional support. As part of an on-going effort to develop a holistic, predictive cyber security risk assessment model, the characterization of human fact...

متن کامل

Cyber Security of Cyber Physical Systems: Cyber Threats and Defense of Critical Infrastructures

Most critical infrastructures such as the power grid, railway or air traffic control, industrial automation in manufacturing, water/sewage infrastructure, banking system, etc., are cyber physical systems (CPS). Since continued availability of the major functions of these are extremely important for economic and normal lives of people, there is a wide spread concern that these might come under i...

متن کامل

Towards Real-time Wireless Cyber-physical Systems

One big challenge to be overcome before the successful deployment of wireless cyber-physical systems is to provide hard real-time guarantees, not only within the wireless network, but in fact between end-to-end application processes. To achieve this, we design a distributed real-time protocol (DRP) that considers the complete transmission chain, including application tasks, peripheral busses, m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2022

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics11244128