메뉴 건너뛰기




Volumn , Issue , 2008, Pages 27-35

An ontology-based approach to react to network attacks

Author keywords

Attack reaction; IDMEF; Ontology; OrBAC; OWL; Policy instantiation; SWRL

Indexed keywords

COMPUTER CRIME; INTERNET; INTERNET PROTOCOLS; QUALITY OF SERVICE; SECURITY SYSTEMS;

EID: 63249101412     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CRISIS.2008.4757461     Document Type: Conference Paper
Times cited : (15)

References (19)
  • 7
    • 63249135157 scopus 로고    scopus 로고
    • N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder Policy Specification Language. In Workshop on Policies for Distributed Systems and Networks (POLICY2001). Lecture Notes in Computer Science, 1995, 2001.
    • N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder Policy Specification Language. In Workshop on Policies for Distributed Systems and Networks (POLICY2001). Lecture Notes in Computer Science, Vol. 1995, 2001.
  • 8
    • 70350716910 scopus 로고    scopus 로고
    • The Intrusion Detection Message Exchange Format (IDMEF)
    • March
    • H. Debar, D. Curry, and B. Feinstein. The Intrusion Detection Message Exchange Format (IDMEF). In IETF Request for Comments 4765, March 2006.
    • (2006) IETF Request for Comments , vol.4765
    • Debar, H.1    Curry, D.2    Feinstein, B.3
  • 11
    • 33947149035 scopus 로고    scopus 로고
    • An ontology description for SIP security flaws
    • March
    • D. Geneiatakis and C. Lambrinoudakis. An ontology description for SIP security flaws. Computer Communications, 30(6):1367-1374, March 2007.
    • (2007) Computer Communications , vol.30 , Issue.6 , pp. 1367-1374
    • Geneiatakis, D.1    Lambrinoudakis, C.2
  • 12
    • 35148839490 scopus 로고
    • A Translation Approach to Portable Ontology Specifications
    • T. R. Gruber. A Translation Approach to Portable Ontology Specifications. Knowledge Acquisition, 5(2):199-220, 1993.
    • (1993) Knowledge Acquisition , vol.5 , Issue.2 , pp. 199-220
    • Gruber, T.R.1
  • 16
    • 0035499176 scopus 로고    scopus 로고
    • Managing Vulnerabilities in Networked Systems
    • November
    • R. A. Martin. Managing Vulnerabilities in Networked Systems. IEEE Computer Magazine, 34(11):32-38, November 2001.
    • (2001) IEEE Computer Magazine , vol.34 , Issue.11 , pp. 32-38
    • Martin, R.A.1
  • 19
    • 26944484588 scopus 로고    scopus 로고
    • Modeling computer attacks: An ontology for intrusion detection
    • J. Undercoffer, A. Joshi, and A. Pinkston. Modeling computer attacks: an ontology for intrusion detection. In Lecture Notes in Computer Science 2820, pages 113-135, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2820 , pp. 113-135
    • Undercoffer, J.1    Joshi, A.2    Pinkston, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.