We examine the intersection of data mining and se-mantic web in this paper. We briefly identify some points where they can impact one another, and then develop a specific example of intrusion detection, an applica-tion of distributed data mining. We have produced an ontology specifying a model of computer attacks. Our model is based upon an analysis of over 4,000 classes of computer attacks and their corresponding attack strate-gies using data derived from CERT/CC advisories and NIST’s ICAT meta-base. We present our attack model first as a taxonomy and convert it to a target-centric ontology that will be refined and expanded over time. We state the benefits of forgoing dependence upon tax-onomies for the classification of computer attacks a...
Security has preeminent importance in today's technological environment. In recent years, as cyber-a...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
Ontologies are a field within semantic technologies concerned with modeling knowledge of a domain th...
Abstract. We state the benefits of transitioning from taxonomies to ontologies and ontology specific...
Studies have shown that computer intrusions have been on the increase in recent times. Many techniqu...
In the security infrastructure, intrusion detection has become an indispensable defense line in face...
Abstract — Intrusion Detection Systems are tools used to detect attacks against networks. Many of th...
Intrusion detection is not new in the area of information security. It is crucial for the intrusion ...
Today, information technology and cyber-services have become the foundation pillars of every busines...
Cyber attack nowadays is increasingly being reported. Defenders need a good understanding of attacke...
One of the most popular attack vectors against computers are their network connections. Attacks on c...
11th International Conference on Metadata and Semantic Research, MTSR 2017 -- 28 November 2017 throu...
This paper presents a methodology using network attack ontology to classify computer-based attacks. ...
This paper proposes an effective approach to model DDoS attacks, and its application to recognize at...
Cyber Civilization has become an important source of information sharing and professional activities...
Security has preeminent importance in today's technological environment. In recent years, as cyber-a...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
Ontologies are a field within semantic technologies concerned with modeling knowledge of a domain th...
Abstract. We state the benefits of transitioning from taxonomies to ontologies and ontology specific...
Studies have shown that computer intrusions have been on the increase in recent times. Many techniqu...
In the security infrastructure, intrusion detection has become an indispensable defense line in face...
Abstract — Intrusion Detection Systems are tools used to detect attacks against networks. Many of th...
Intrusion detection is not new in the area of information security. It is crucial for the intrusion ...
Today, information technology and cyber-services have become the foundation pillars of every busines...
Cyber attack nowadays is increasingly being reported. Defenders need a good understanding of attacke...
One of the most popular attack vectors against computers are their network connections. Attacks on c...
11th International Conference on Metadata and Semantic Research, MTSR 2017 -- 28 November 2017 throu...
This paper presents a methodology using network attack ontology to classify computer-based attacks. ...
This paper proposes an effective approach to model DDoS attacks, and its application to recognize at...
Cyber Civilization has become an important source of information sharing and professional activities...
Security has preeminent importance in today's technological environment. In recent years, as cyber-a...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
Ontologies are a field within semantic technologies concerned with modeling knowledge of a domain th...