Abstract — Intrusion Detection Systems are tools used to detect attacks against networks. Many of these attacks are a sequence of multiple simple attacks. These complex attacks are more difficult to identify because (a) they are difficult to predict, (b) almost anything could be an attack, and (c) there are a huge number of possibilities. The problem is that the expertise of what constitutes an attack lies in the tacit knowledge of experienced network engineers. By providing an ontological representation of what constitutes a network attack human expertise to be codified and tested. The details of this representation are explained. An implementation of the representation has been developed. Lastly, the use of the representation in an Intrus...
We examine the intersection of data mining and se-mantic web in this paper. We briefly identify some...
Software systems have become highly distributed and complex involving independent components working...
Ontologies are a field within semantic technologies concerned with modeling knowledge of a domain th...
One of the most popular attack vectors against computers are their network connections. Attacks on c...
This paper presents a methodology using network attack ontology to classify computer-based attacks. ...
Studies have shown that computer intrusions have been on the increase in recent times. Many techniqu...
In the security infrastructure, intrusion detection has become an indispensable defense line in face...
Abstract. We state the benefits of transitioning from taxonomies to ontologies and ontology specific...
11th International Conference on Metadata and Semantic Research, MTSR 2017 -- 28 November 2017 throu...
Graph knowledge models and ontologies are very powerful modeling and reasoning tools. We propose an ...
Intrusion detection is not new in the area of information security. It is crucial for the intrusion ...
We first consider network security services and then review threats, vulnerabilities and failure mo...
The integration of networks within an organization made many critical infrastructures (CI) and their...
This paper proposes an effective approach to model DDoS attacks, and its application to recognize at...
Security has preeminent importance in today's technological environment. In recent years, as cyber-a...
We examine the intersection of data mining and se-mantic web in this paper. We briefly identify some...
Software systems have become highly distributed and complex involving independent components working...
Ontologies are a field within semantic technologies concerned with modeling knowledge of a domain th...
One of the most popular attack vectors against computers are their network connections. Attacks on c...
This paper presents a methodology using network attack ontology to classify computer-based attacks. ...
Studies have shown that computer intrusions have been on the increase in recent times. Many techniqu...
In the security infrastructure, intrusion detection has become an indispensable defense line in face...
Abstract. We state the benefits of transitioning from taxonomies to ontologies and ontology specific...
11th International Conference on Metadata and Semantic Research, MTSR 2017 -- 28 November 2017 throu...
Graph knowledge models and ontologies are very powerful modeling and reasoning tools. We propose an ...
Intrusion detection is not new in the area of information security. It is crucial for the intrusion ...
We first consider network security services and then review threats, vulnerabilities and failure mo...
The integration of networks within an organization made many critical infrastructures (CI) and their...
This paper proposes an effective approach to model DDoS attacks, and its application to recognize at...
Security has preeminent importance in today's technological environment. In recent years, as cyber-a...
We examine the intersection of data mining and se-mantic web in this paper. We briefly identify some...
Software systems have become highly distributed and complex involving independent components working...
Ontologies are a field within semantic technologies concerned with modeling knowledge of a domain th...