Automated Reasoning over Provenance-Aware Communication Network Knowledge in Support of Cyber-Situational Awareness

Cyber-situational awareness is crucial to applications such as network monitoring and management, vulnerability assessment, and defense. To gain improved cyber-situational awareness, analysts can benefit from automated reasoning-based frameworks. However, such frameworks would require the processing of enormous amounts of network data, which are characterized by syntactic variability. The formal representation of networking concepts, their properties, and interrelations using RDF can narrow the interoperability gaps between routing information and network semantics. Formal knowledge representation also enables automated reasoning, which facilitates network knowledge discovery by making implicit statements explicit. However, capturing and reasoning over the provenance of RDF statements, which is essential to build analysts’ trust in automated support tools, is not trivial. This paper presents a novel framework for capturing provenance-aware network knowledge to enable automated reasoning for network applications that require cyber-situational awareness.

[1]  Amit P. Sheth,et al.  Provenance Context Entity (PaCE): Scalable Provenance Tracking for Scientific RDF Data , 2010, SSDBM.

[2]  Phani Raj Tadimety Link State Advertisements , 2015 .

[3]  Amit P. Sheth,et al.  Provenir Ontology: Towards a Framework for eScience Provenance Management , 2009 .

[4]  René Serral-Gracià,et al.  Applying Information Extraction for Abstracting and Automating CLI-Based Configuration of Network Devices in Heterogeneous Environments , 2015, Artificial Intelligence Applications in Information and Communication Technologies.

[5]  Gerhard Weikum,et al.  YAGO2: A Spatially and Temporally Enhanced Knowledge Base from Wikipedia: Extended Abstract , 2013, IJCAI.

[6]  Amit P. Sheth,et al.  Don't like RDF reification?: making statements about statements using singleton property , 2014, WWW.

[7]  Vassilis Christophides,et al.  Coloring RDF Triples to Capture Provenance , 2009, SEMWEB.

[8]  Olaf Hartig,et al.  Foundations of an Alternative Approach to Reification in RDF , 2014, ArXiv.

[9]  Leslie F. Sikos,et al.  Mastering Structured Data on the Semantic Web , 2015, Apress.

[10]  Jiejun Hu,et al.  A semantics-based approach to multi-source heterogeneous information fusion in the internet of things , 2017, Soft Comput..

[11]  Leslie F. Sikos Description Logics in Multimedia Reasoning , 2017, Springer International Publishing.

[12]  James A. Hendler,et al.  N3Logic: A logical framework for the World Wide Web , 2007, Theory and Practice of Logic Programming.

[13]  Grigoris Antoniou,et al.  Why-provenance information for RDF, rules, and negation , 2014, Annals of Mathematics and Artificial Intelligence.

[14]  Jeremy J. Carroll,et al.  Named graphs, provenance and trust , 2005, WWW '05.

[15]  Umberto Straccia,et al.  A General Framework for Representing, Reasoning and Querying with Annotated Semantic Web Data , 2011, J. Web Semant..

[16]  Markus Stumptner,et al.  Representing network knowledge using provenance-aware formalisms for cyber-situational awareness , 2018, KES.

[17]  Alexander Kott,et al.  Cyber Defense and Situational Awareness , 2015, Advances in Information Security.

[18]  Deborah L. McGuinness,et al.  Tracking RDF Graph Provenance using RDF Molecules , 2005 .

[19]  Herman J. ter Horst,et al.  Completeness, decidability and complexity of entailment for RDF Schema and a semantic extension involving the OWL vocabulary , 2005, J. Web Semant..

[20]  Catherine Howard,et al.  Representing and Reasoning About Logical Network Topologies , 2017, GKR.

[21]  Steffen Staab,et al.  Querying for provenance, trust, uncertainty and other meta knowledge in RDF , 2009, J. Web Semant..

[22]  John Yen,et al.  Studying Analysts' Data Triage Operations in Cyber Defense Situational Analysis , 2017, Theory and Models for Cyber Situation Awareness.

[23]  Michael D. McNeese,et al.  Information data fusion and computer network defense , 2012 .

[24]  George Karabatis,et al.  A Framework for Contextual Information Fusion to Detect Cyber-Attacks , 2017 .

[25]  Richard Dapoigny,et al.  Formal foundations for situation awareness based on dependent type theory , 2013, Inf. Fusion.