Computer Science ›› 2014, Vol. 41 ›› Issue (10): 173-176.doi: 10.11896/j.issn.1002-137X.2014.10.039

Previous Articles     Next Articles

Research on Cyber Attack Case Base Model Based on Ontology

LI Wen-xiong,WU Dong-ying,LIU Sheng-li and XIAO Da   

  • Online:2018-11-14 Published:2018-11-14

Abstract: In the study of network security,cyber-attack case plays an important role for effectively analyzing and defensing network illegal intrusion.However,how to effectively build cyber-attack case base is one of the difficulties.For there is no perfect cyber-attack case base,this paper studied the cyber-attack case model based on ontology.This paper first defined formalized representation of cyber-attack case,classified cyber-attack case domain knowledge,and on this basis,applying ontology,the knowledge sharing tools,built a sharing,reusable,scalable cyber-attack case model,finally,using the model of cyber-attack case put forward based on ontology,realized knowledge acquisition of a network attack events,to verify the validity of the model.

Key words: Cyber attack,Case presentation,Ontology,Case base model

[1] López B.Case-Based Reasoning:A Concise Introduction[J].Synthesis Lectures on Artificial Intelligence and Machine Learning,2013,7(1):1-103
[2] Acorn T,Walden S.SMART:Support management automated reasoning technology for Compaq customer service[C]∥Proceedings of the Tenth National Conference on Artificial Intelligence.MIT Press,1992
[3] William M.Bain Judge:a case-based reasoning system Machine learning[M]∥a guide to current research.Kluwer Academic Publishers Norwell,MA,USA,1986
[4] 邓志鸿,唐世渭,张铭,等.Ontology研究综述[J].北京大学学报:自然科学版,2002,38(5):730-738
[5] 王前,冯亚军,杨兆民,等.基于本体的网络攻击模型及其应用[J].计算机科学,2010,37(6):114-117
[6] 吴林锦,武东英,刘胜利,等.基于本体的网络入侵知识库模型研究[J].计算机科学,2013,0(9):120-124,9
[7] 谢新洲,夏晨曦.网络事件案例库建设与案例数据分析[J].情报学报,2012,31(1):72-81
[8] Amailef K,Lu J.Ontology-supported case-based reasoning approach for intelligent m-Government emergency response ser-vices[J].Decision Support Systems,2013,55(1):79-97
[9] Akmal S,Batres R,Shih L H.An Ontology-based Approach for Product-Service System Design[M]∥The Philosopher’s Stone for Sustainability.Springer Berlin Heidelberg,2013:67-72
[10] McClure S,Scambray J,Kurtz G.黑客大曝光:网络安全机密与解决方案[M].2006

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!