Computer Science ›› 2013, Vol. 40 ›› Issue (9): 120-124.

Previous Articles     Next Articles

Research on Network Intrusion Knowledge Base Model Based on Ontology

WU Lin-jin,WU Dong-ying,LIU Sheng-li and LIU Long   

  • Online:2018-11-16 Published:2018-11-16

Abstract: In the field of information security,network intrusion knowledge base plays an important role in effective analysis and defense of the illegal invasion,but network intrusion knowledge base construction is one of the difficulties of research.As a conceptual modeling tool to provide knowledge sharing for a specific area,ontology has been widely used in various fields.Because there is no complete network intrusion ontology,the paper aimed to study the ontology-based network intrusion knowledge base model and build network intrusion knowledge ontology.Firstly,on the basis of in-depth analysis of network intrusion technology,the paper gave formalized definition of various types of network actions and the multi-level and multi-dimensional network intrusion knowledge base classification system.Then combining with the principles of ontology modeling,the paper built the network intrusion knowledge ontology composed of the network intrusion knowledge domain ontology,task ontology,application ontology and atomic ontology,giving the logical relationship and organizational structure between them.Finally,through two network scenarios the paper verified the validityof the model in the application of network intrusion knowledge acquisition.

Key words: Ontology,Knowledge base,Network intrusion,Network scenario,Formalization

[1] Towards G T.Principles for the Design of Ontologies Used for Knowledge Sharing[J].International Journal of Human-Computer Studies,1995,43(5/6):907-928
[2] Knight K,et al.Filling knowledge gaps in a broad-coverage Machine Translation system[C]∥Proceedings of the 14th International Joint Conference on Artificial Intelligence,IJCAI95.Montréal,Québec,Canada,Morgan Kaufmann,1995(2):1390-1396
[3] Bodenreider O.The unified medical language system(UMLS):integrating biomedical terminology[J].Nucletic Acids Research,2004,32(Database issue D):267-270
[4] Lenat D B,Guha R V.Building Large Knowledge-Based Systems:Representation and Inference in the Cyc Project[D].Reading MA:Addison-Wesley Publishing Company,Inc.,1989
[5] Weibel S.The Dublin Core:A Simple Content Description Model for Electronic Resources[J].Bulletin of the American Society for Information Science and Technology,1997,24(1):9-11
[6] Miller G A.WordNet:a lexical database for English[J].Communications of the ACM,1995,38(11):39-41
[7] 陆汝钤,石纯一,张松懋,等.面向Agent的常识知识库[J].中国科学E辑,2000,30(5):453-463
[8] 曹存根,丰强泽,高颖,等.Progress in the Development of National Knowledge Infrastructure[J].计算机科学技术学报:英文版,2002,17(5):523-534
[9] 金芝.基于本体的需求自动获取[J].计算机学报,2000,23(5):486-492
[10] 钟秀琴,符红光,佘莉,等.基于本体的几何学知识获取及知识表示[J].计算机学报,2010,1(33):167-174
[11] 王前,冯亚军,杨兆民,等.基于本体的网络攻击模型及其应用[J].计算机科学,2010,37(6):114-117
[12] Peng Ning,Yun Cui,Douglas S.Constructing Attack Scenarios through Correlation of Intrusion Alerts[C]∥The 19th ACM Conference on Computer and Communications Security,ACM CCS 2002.Washington:North Carolina State University,2002:245-254
[13] 邓志鸿,唐世渭,张铭,等.Ontology研究综述[J].北京大学学报:自然科学版,2002,38(5):730-738
[14] Studer R,Benjamins V R,Fensel D.Knowledge Engineering,Principles and Methods[J].Data and Knowledge Engineering,1998,25(1/2):161-197
[15] Perez A G,Benjamins V R.Overview of Knowledge Sharing and Reuse Components:Ontologies and Problem-Solving Methods[C]∥Proceedings of the IJCAI-99workshop on Ontologies and Problem-Solving Methods(KRR5).1999:1-15
[16] 诸葛建伟.网络攻防技术与实践[M].北京:电子工业出版社,2011

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!