Knowledge base of dynamic risk control strategy based on immunity is a significant effect on effective analysis and defense against illegal network intrusion. How to realize the automatic understanding and processing of computers with control strategy knowledge is of great significance for quickly responding to network security risks. As a kind of knowledge representation tool, ontology can provide support for knowledge sharing, reuse and automatic computer understanding in specific fields, and has been widely used in various fields. This paper first introduces the immune-based network dynamic risk control model and network dynamic risk quantitative evaluation. And then, according to the ontology modeling method of network dynamic risk control strategy knowledge, this paper extracts domain knowledge concepts, attributes, relationships, instances, etc., and constructs domain ontology model, application ontology model, and atom ontology model for the network dynamic risk control strategy knowledge. These ontology models are represented using semantic Web ontology expression languages PDF and OWL, and are constructed using the protege ontology editing tool. Finally, the important concepts in the knowledge of network dynamic risk control strategy and the relationship between concepts are expressed in the form of graph, so as to help the network security analysts and decision makers to effectively control and make decisions.
[1]
Wu Lin-ji.
Research on Network Intrusion Knowledge Base Model Based on Ontology
,
2013
.
[2]
Xiao Ren.
Artificial Immune System: Principle, Models, Analysis and Perspectives
,
2002
.
[3]
Michael D. Iannacone,et al.
Developing an Ontology for Cyber Security Knowledge Graphs
,
2015,
CISR.
[4]
Ricardo Jardim-Gonçalves,et al.
An Ontology-Based Cybersecurity Framework for the Internet of Things
,
2018,
Sensors.
[5]
Yan Jia,et al.
A Practical Approach to Constructing a Knowledge Graph for Cybersecurity
,
2018
.
[6]
Jiao Li,et al.
Development and Prospect of the Artificial Immune System
,
2003
.
[7]
Jonathan Timmis,et al.
Artificial immune systems as a novel soft computing paradigm
,
2003,
Soft Comput..
[8]
Dieter Fensel,et al.
Knowledge Engineering: Principles and Methods
,
1998,
Data Knowl. Eng..
[9]
Tao Li,et al.
An immunity based network security risk estimation
,
2005,
Science in China Series F: Information Sciences.
[10]
Leo Obrst,et al.
Developing an Ontology of the Cyber Security Domain
,
2012,
STIDS.