An Ontological Approach Applied to Information Security and Trust
نویسندگان
چکیده
Software applications become highly distributed and complex, involving independent collaborating components working towards achieving system goals. At the same time, security attacks against these applications have also grown being more sophisticated and are quite difficult to detect and withstand, especially distributed attacks. In this paper, we argue that one way to identify and mitigate such attacks is through the trust-based collaboration of application components. However, to achieve collaborative defense in distributed environments, a common vocabulary is needed for the components to collaborate with each other in identifying security incidents. Thus, we employ an ontological approach to define security ontologies as a common vocabulary that is understandable for both humans and software agents. Further, we introduce basic security concepts and trust implications, explain our security ontologies (specified in OWL) that include the security asset-vulnerability ontology (SAVO), the security algorithm-standard ontology (SASO), the security function ontology (SFO), and the security attack and defence ontologies (SAO and SDO respectively). Trust is also examined while its dimensions are employed to create trust-based communications used to distribute security ontologies. We use a case study involving Mitnick attacks to demonstrate our approach.
منابع مشابه
امنیت هستیشناختی و مسائل امنیتی خلیجفارس بعد از انقلاب اسلامی ایران
Constructivism theory by employing a humanistic vision to issues has provided the the opportunity of considering the special characters of human in political studies. Therefore factors such as identity, benefits, purposes, intentions, and many other issues found important role in security Studies. Ontological Security employed this approach to security matters. This theory seeks to clarify...
متن کاملA Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing
Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. Probabilistic approaches are proposed in order to reduce the computation overhead pertaining to the verification process. In this paper, we use the notion of trust as the basis of our probabilistic app...
متن کاملAn Ontological View of Trusted OLSR Protocol of Ad hoc Network
Ad hoc network infrastructure is dynamically changing, and the links are wireless with less capacity and more prone to errors. Adding trust to the existing security infrastructures would enhance the security of these environments. Describing components and their sub-components using ontologies, creates a methodology and mechanism in order to efficiently design. With a viewpoint to add trust as ...
متن کاملThe Impact of Context on the Trustworthiness of Communication: An Ontological Approach
We outline a Semantic Web approach for considering the impact of context information on the trustworthiness of communication. We show that the contexts of message sender, receiver, and mediating network can have influence on the degree of trust the receiver assigns to a message. We define ontologies to capture context-sensitive messaging and trust, as well as propose trust evaluation functions....
متن کاملThe Revolutions of 2011-2012 in the Arabic Countries and Ontological Security of Israel
This paper seeks to examine the effect of the revolutions of 2011-2012 in the Arabic countries of the Middle East and North Africa (MENA) on Israeli regime's ontological security and its strategy of closure and deviation in the regional level. In other word, the paper tries to find the challenges the ontological security and identity of Israel is facing with after the occurrence of the awakenin...
متن کامل