Semantic integration of security knowledge sources

Ana-Maria Ghiran, R. Buchmann
{"title":"Semantic integration of security knowledge sources","authors":"Ana-Maria Ghiran, R. Buchmann","doi":"10.1109/RCIS.2018.8406673","DOIUrl":null,"url":null,"abstract":"For evaluating the security in enterprise systems, we need a security model that is amenable to integration, automated comparison and assessment. Over the years, practitioners have used various frameworks or standards (COBIT, ISO 2700x family) as checklists against which they could assess the security level in enterprise systems. On the other hand, researchers were more concerned with analysing security requirements or designing software for describing those requirements. These security models are either too general and contain unnecessary information for a particular organisation, or are highly dependent on the expertise of a security engineer. Besides these standards that are giving guidelines regarding security, there are many other sources like books, blogs, news, trainings and courses that produce security recommendations, there are regulations that mandate awareness about security, but still, organisations are missing appropriate knowledge and their systems are often attacked and breached. Having all these means available at a click of a mouse, it is questionable how can we use them in order to find the right solution that generates appropriate behaviour. This paper intends to tackle this problem by formulating a proposal for a methodology to setup a hybrid security knowledge repository for enterprise systems. The proposed solution will enable various stakeholders to add/share security knowledge in/from a repository and at the same time can use external trusted security data (from collaborative partners or reliable organisations) to enrich this knowledge base via semantic inter-operability techniques. Combining various online sources with knowledge from security officers would enable inferring new insights. The security knowledge holds some key characteristics that are considered as imperative. We referred to these as the 5C: Complexity, Continuity, Comprehensive and Cross-organisations, Compliance and Common representation. Our approach is making use of a common representation based on semantic technology for describing both security requirements pertaining to an organisation and trusted external security data.","PeriodicalId":408651,"journal":{"name":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RCIS.2018.8406673","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

For evaluating the security in enterprise systems, we need a security model that is amenable to integration, automated comparison and assessment. Over the years, practitioners have used various frameworks or standards (COBIT, ISO 2700x family) as checklists against which they could assess the security level in enterprise systems. On the other hand, researchers were more concerned with analysing security requirements or designing software for describing those requirements. These security models are either too general and contain unnecessary information for a particular organisation, or are highly dependent on the expertise of a security engineer. Besides these standards that are giving guidelines regarding security, there are many other sources like books, blogs, news, trainings and courses that produce security recommendations, there are regulations that mandate awareness about security, but still, organisations are missing appropriate knowledge and their systems are often attacked and breached. Having all these means available at a click of a mouse, it is questionable how can we use them in order to find the right solution that generates appropriate behaviour. This paper intends to tackle this problem by formulating a proposal for a methodology to setup a hybrid security knowledge repository for enterprise systems. The proposed solution will enable various stakeholders to add/share security knowledge in/from a repository and at the same time can use external trusted security data (from collaborative partners or reliable organisations) to enrich this knowledge base via semantic inter-operability techniques. Combining various online sources with knowledge from security officers would enable inferring new insights. The security knowledge holds some key characteristics that are considered as imperative. We referred to these as the 5C: Complexity, Continuity, Comprehensive and Cross-organisations, Compliance and Common representation. Our approach is making use of a common representation based on semantic technology for describing both security requirements pertaining to an organisation and trusted external security data.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
安全知识库的语义集成
为了评估企业系统中的安全性,我们需要一个能够集成、自动比较和评估的安全模型。多年来,从业者已经使用了各种框架或标准(COBIT、ISO 2700x系列)作为检查清单,他们可以根据这些清单评估企业系统中的安全级别。另一方面,研究人员更关心分析安全需求或设计用于描述这些需求的软件。这些安全模型要么过于一般化,包含了特定组织所不需要的信息,要么高度依赖于安全工程师的专业知识。除了这些提供安全指导方针的标准之外,还有许多其他来源,如书籍、博客、新闻、培训和课程,提供安全建议,也有法规要求人们提高安全意识,但组织仍然缺乏适当的知识,他们的系统经常受到攻击和破坏。只要点击一下鼠标就可以使用所有这些手段,我们如何使用它们来找到产生适当行为的正确解决方案是值得怀疑的。本文试图通过提出一种建立企业系统混合安全知识库的方法来解决这一问题。建议的解决方案将使各种涉众能够在存储库中/从存储库中添加/共享安全知识,同时可以使用外部可信安全数据(来自协作伙伴或可靠组织)通过语义互操作性技术丰富该知识库。将各种在线资源与安全官员的知识结合起来,可以推断出新的见解。安全知识包含一些被认为是必需的关键特征。我们将其称为5C:复杂性、连续性、综合性和跨组织、合规性和共同代表性。我们的方法是利用基于语义技术的公共表示来描述与组织相关的安全需求和可信的外部安全数据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
ProDiGy : Human-in-the-loop process discovery Using Probabilistic Relational Models to generate synthetic spatial or non-spatial databases Fast SPARQL join processing between distributed streams and stored RDF graphs using bloom filters Machine learning with Internet of Things data for risk prediction: Application in ESRD Lip movements recognition towards an automatic lip reading system for Myanmar consonants
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1