An Ontological Approach Applied to Information Security and Trust

Software applications become highly distributed and complex, involving independent collaborating components working towards achieving system goals. At the same time, security attacks against these applications have also grown being more sophisticated and are quite difficult to detect and withstand, especially distributed attacks. In this paper, we argue that one way to identify and mitigate such attacks is through the trust-based collaboration of application components. However, to achieve collaborative defense in distributed environments, a common vocabulary is needed for the components to collaborate with each other in identifying security incidents. Thus, we employ an ontological approach to define security ontologies as a common vocabulary that is understandable for both humans and software agents. Further, we introduce basic security concepts and trust implications, explain our security ontologies (specified in OWL) that include the security asset-vulnerability ontology (SAVO), the security algorithm-standard ontology (SASO), the security function ontology (SFO), and the security attack and defence ontologies (SAO and SDO respectively). Trust is also examined while its dimensions are employed to create trust-based communications used to distribute security ontologies. We use a case study involving Mitnick attacks to demonstrate our approach.

[1]  P. Pettit The Cunning of Trust , 1995 .

[2]  Joobin Choobineh,et al.  Trust in electronic commerce: definition and theoretical considerations , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.

[3]  Dan Brickley,et al.  Resource description framework (RDF) schema specification , 1998 .

[4]  Michael Uschold,et al.  The Enterprise Ontology , 1998, The Knowledge Engineering Review.

[5]  James A. Hendler,et al.  The semantic Web and its languages , 2000 .

[6]  N. F. Noy,et al.  Ontology Development 101: A Guide to Creating Your First Ontology , 2001 .

[7]  Khaled M. Khan,et al.  A security characterisation framework for trustworthy component based software systems , 2003, Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003.

[8]  James Michael Stewart,et al.  CISSP: Certified Information Systems Security Professional Study Guide, 2nd Edition , 2004 .

[9]  Timothy W. Finin,et al.  A Target-Centric Ontology for Intrusion Detection , 2003, IJCAI 2003.

[10]  Gerardo A. Guerra,et al.  Economics of Trust in the Information Economy: Issues of Identity, Privacy and Security , 2003 .

[11]  Grit Denker,et al.  OWL-S Semantics of Security Web Services: a Case Study , 2004, ESWS.

[12]  P. Ratnasingam E‐Commerce relationships: The impact of trust on relationship continuity , 2005 .

[13]  Robert C. Seacord,et al.  A Structured Approach to Classifying Security Vulnerabilities , 2005 .

[14]  Myong H. Kang,et al.  Security Ontology for Annotating Resources , 2005, OTM Conferences.

[15]  Jun Han,et al.  Security Attack Ontology for Web Services , 2006, SKG.

[16]  Luciana Andréia Fondazzi Martimiano,et al.  The Evaluation Process of a Computer Security Incident Ontology , 2006, WONTO.

[17]  Jun Han,et al.  Specifying Dynamic Security Properties of Web Service Based Systems , 2006, SKG.

[18]  肖欣,et al.  CISSP学习工具和策略如何通过Certified Information Systems Security Professional考试 , 2008 .