计算机科学 ›› 2014, Vol. 41 ›› Issue (10): 173-176.doi: 10.11896/j.issn.1002-137X.2014.10.039

• 信息安全 • 上一篇    下一篇

基于本体的网络攻击案例库模型研究

李文雄,武东英,刘胜利,肖达   

  1. 数学工程与先进计算国家重点实验室 郑州450001;数学工程与先进计算国家重点实验室 郑州450001;数学工程与先进计算国家重点实验室 郑州450001;数学工程与先进计算国家重点实验室 郑州450001
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受郑州市科技创新团队项目(10CXTD150),国家自然科学基金项目(61309007)资助

Research on Cyber Attack Case Base Model Based on Ontology

LI Wen-xiong,WU Dong-ying,LIU Sheng-li and XIAO Da   

  • Online:2018-11-14 Published:2018-11-14

摘要: 在网络安全研究中,网络攻击案例对有效分析和防御网络非法入侵起着重要作用。然而,如何有效地构建网络攻击案例库是研究的难点之一。鉴于目前还没有一个完善的网络攻击案例库,基于本体研究了网络攻击案例库模型。首先定义了网络攻击行为的案例形式化表示,对网络攻击案例领域知识进行了分类,在此基础上,应用知识共享工具本体,构建了一个共享、重用、可扩展的网络攻击案例本体模型。最后,应用构建的基于本体的网络攻击案例库模型,对一次网络攻击事件进行知识获取,以验证模型的有效性。

关键词: 网络攻击,案例表示,本体,案例库模型

Abstract: In the study of network security,cyber-attack case plays an important role for effectively analyzing and defensing network illegal intrusion.However,how to effectively build cyber-attack case base is one of the difficulties.For there is no perfect cyber-attack case base,this paper studied the cyber-attack case model based on ontology.This paper first defined formalized representation of cyber-attack case,classified cyber-attack case domain knowledge,and on this basis,applying ontology,the knowledge sharing tools,built a sharing,reusable,scalable cyber-attack case model,finally,using the model of cyber-attack case put forward based on ontology,realized knowledge acquisition of a network attack events,to verify the validity of the model.

Key words: Cyber attack,Case presentation,Ontology,Case base model

[1] López B.Case-Based Reasoning:A Concise Introduction[J].Synthesis Lectures on Artificial Intelligence and Machine Learning,2013,7(1):1-103
[2] Acorn T,Walden S.SMART:Support management automated reasoning technology for Compaq customer service[C]∥Proceedings of the Tenth National Conference on Artificial Intelligence.MIT Press,1992
[3] William M.Bain Judge:a case-based reasoning system Machine learning[M]∥a guide to current research.Kluwer Academic Publishers Norwell,MA,USA,1986
[4] 邓志鸿,唐世渭,张铭,等.Ontology研究综述[J].北京大学学报:自然科学版,2002,38(5):730-738
[5] 王前,冯亚军,杨兆民,等.基于本体的网络攻击模型及其应用[J].计算机科学,2010,37(6):114-117
[6] 吴林锦,武东英,刘胜利,等.基于本体的网络入侵知识库模型研究[J].计算机科学,2013,0(9):120-124,9
[7] 谢新洲,夏晨曦.网络事件案例库建设与案例数据分析[J].情报学报,2012,31(1):72-81
[8] Amailef K,Lu J.Ontology-supported case-based reasoning approach for intelligent m-Government emergency response ser-vices[J].Decision Support Systems,2013,55(1):79-97
[9] Akmal S,Batres R,Shih L H.An Ontology-based Approach for Product-Service System Design[M]∥The Philosopher’s Stone for Sustainability.Springer Berlin Heidelberg,2013:67-72
[10] McClure S,Scambray J,Kurtz G.黑客大曝光:网络安全机密与解决方案[M].2006

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!