Enabling New Technologies for Cyber Security Defense with the ICAS Cyber Security Ontology
نویسندگان
چکیده
Distribution Statement ”A” (Approved for Public Release, Distribution Unlimited) Abstract—Incident response teams that are charged with breach discovery and containment face several challenges, the most important of which is access to pertinent data. Our TAPIO (Targeted Attack Premonition using Integrated Operational data) tool is designed to solve this problem by automatically extracting data from across the enterprise into a fully linked semantic graph and making it accessible in real time. Automated data translation reduces the costs to deploy and extend the system, while presenting data as a linked graph gives analysts a powerful tool for rapidly exploring the causes and effects of a particular event. At the heart of this tool is a cyber security ontology that is specially constructed to enable the TAPIO tool to automatically ingest data from a wide range of data sources, and which provides semantic relationships across the landscape of an enterprise network. In this paper we present this ontology, describe some of the decisions made during its development, and outline how it enables automated mapping technologies of the TAPIO system.
منابع مشابه
Using Ontologies to Quantify Attack Surfaces
Cyber security remains one of the most serious challenges to national security and the economy that we face today. Systems employing well known but static defenses are increasingly vulnerable to penetration from determined, diverse, and well resourced adversaries launching targeted attacks such as Advanced Persistent Threats (APTs). Due to the heavy focus on cyber security technologies in both ...
متن کاملSecond Annual Cyber Security and Information Infrastructure Research Workshop May 10 - 11 , 2006 BEYOND THE MAGINOT LINE
Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an inves...
متن کاملحاکمیت شبکهای در نهادهای پژوهشی امنیت سایبری
Governments change their governance style according to social, political and economic conditions. Cyber security technology is among today’s most changeable technologies, which is a critical key to the national security. Because of the weaknesses in the interaction among syber security research organizations, introducing a model for utilizing all existing capabilities can be an appro...
متن کاملFederated Cloud Security Architecture for Secure and Agile Clouds
Cyber threats against clouds have evolved rapidly. Traditional reactive cyber defense technologies are not effective and sufficient to protect federated clouds. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set of seamlessly integ...
متن کاملAccessible Remote Testbed for Cyber-Physical Systems Security of the Smart Grid
With growing concerns for cyber security of critical infrastructures like the power grid, Cyber-Physical Systems (CPS) security testbeds are essential in providing controlled testing environments for evaluating and validating novel CPS security tools and technologies, thereby accelerating the transition of research to industrial practice. The engineering of such testbeds requires significant in...
متن کامل