메뉴 건너뛰기




Volumn 45, Issue , 2014, Pages 124-146

Ontology for attack detection: An intelligent approach to web application security

Author keywords

Cyber security; Information security; Ontology based intelligent system; Semantic security; Web application security

Indexed keywords

HTTP; HYPERTEXT SYSTEMS; INTELLIGENT SYSTEMS; LEARNING TO RANK; ONTOLOGY; PERSONAL COMPUTING; QUALITY CONTROL; REUSABILITY; SECURITY OF DATA; SEMANTICS;

EID: 84903138908     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2014.05.005     Document Type: Article
Times cited : (58)

References (84)
  • 4
    • 33646164799 scopus 로고    scopus 로고
    • Ontology evaluation
    • Steen Staab, Rudi Studer, 1st ed. Springer [chapter 13]
    • Asuncion Gomez-Perez Ontology evaluation Steen Staab, Rudi Studer, Handbook on ontologies 1st ed. 2004 Springer 251 274 [chapter 13]
    • (2004) Handbook on Ontologies , pp. 251-274
    • Gomez-Perez, A.1
  • 7
    • 84871965286 scopus 로고    scopus 로고
    • Network Working Group Internet-Draft (Last visited Feb 11, 2014)
    • Belshe, Mike, Peon, and Roberto SPDY protocol 2012 Network Working Group Internet-Draft http://tools.ietf.org/html/draft-mbelshe-httpbis-spdy-00 (Last visited Feb 11, 2014)
    • (2012) SPDY Protocol
    • Belshe1    Mike2    Peon3    Roberto4
  • 8
    • 42149158539 scopus 로고    scopus 로고
    • Systems Engineering and Computer Science Department, UFRJ Río de Janeiro, Brazil
    • J. Biolchini, and P. Gomes Systematic review in software engineering 2005 Systems Engineering and Computer Science Department, UFRJ Río de Janeiro, Brazil
    • (2005) Systematic Review in Software Engineering
    • Biolchini, J.1    Gomes, P.2
  • 12
    • 77649256473 scopus 로고    scopus 로고
    • Building legal ontologies with methontology and WebODE
    • R. Benjamins, P. Casanovas, J. Breuker, A. Gangemi, Springer-Verlag LNAI No. 3369. ISBN: 3-540-25063-8
    • O. Corcho, M. Fernández, A. Gómez-Pérez, and A. López-Cima Building legal ontologies with methontology and WebODE R. Benjamins, P. Casanovas, J. Breuker, A. Gangemi, Law and the semantic web 2005 Springer-Verlag 142 157 LNAI No. 3369. ISBN: 3-540-25063-8
    • (2005) Law and the Semantic Web , pp. 142-157
    • Corcho, O.1    Fernández, M.2    Gómez-Pérez, A.3    López-Cima, A.4
  • 16
    • 17044383806 scopus 로고    scopus 로고
    • Security in the Semantic Web using OWL
    • DOI 10.1016/j.istr.2004.11.002, PII S1363412704000032
    • Grit Denker, Lalana Kagal, and Tim Finin Security in the semantic web using OWL Journal of Information Security, Technical Report 10 1 2005 51 58 (Pubitemid 40497376)
    • (2005) Information Security Technical Report , vol.10 , Issue.1 , pp. 51-58
    • Denker, G.1    Kagal, L.2    Finin, T.3
  • 20
    • 66249109617 scopus 로고    scopus 로고
    • Ontological mapping of information security best-practice guidelines
    • W. Abramowicz, Springer-Verlag Berlin Heidelberg
    • Stefan Fenz, Thomas Pruckner, and Arman Manutscheri Ontological mapping of information security best-practice guidelines W. Abramowicz, BIS 2009, LNBIP 21 2009 Springer-Verlag Berlin Heidelberg 49 60
    • (2009) BIS 2009, LNBIP 21 , pp. 49-60
    • Fenz, S.1    Pruckner, T.2    Manutscheri, A.3
  • 28
    • 84903215392 scopus 로고    scopus 로고
    • Management of heterogeneous security access control configuration using an ontology engineering approach
    • ACM Chicago, Illinois, USA
    • William M. Fitzgerald, and Simon N. Foley Management of heterogeneous security access control configuration using an ontology engineering approach SafeConfig'10 October 4, 2010 ACM Chicago, Illinois, USA
    • (2010) SafeConfig'10
    • Fitzgerald, W.M.1    Foley, S.N.2
  • 29
    • 84874231119 scopus 로고    scopus 로고
    • A theoretical framework for ontology evaluation and validation
    • Aldo Gangemi, Carola Catenacci, Massimiliano Ciaramita, and Jos Lehmann A theoretical framework for ontology evaluation and validation SWAP 166 2005
    • (2005) SWAP , vol.166
    • Gangemi, A.1    Catenacci, C.2    Ciaramita, M.3    Lehmann, J.4
  • 33
    • 0012257635 scopus 로고    scopus 로고
    • Evaluating ontological decisions with ontoclean
    • Guarino, N. and Welty, C.: Evaluating ontological decisions with OntoClean. Journal of Communications of the ACM, ACM Press, New York, NY, USA, Vol. 45, No. 2, pp. 61-65, 2002. (Pubitemid 135699725)
    • (2002) Communications of the ACM , vol.45 , Issue.2 , pp. 61-65
    • Guarino, N.1    Welty, C.2
  • 35
    • 0012257635 scopus 로고    scopus 로고
    • Evaluating ontological decisions with ontoclean
    • Nicola Guarino, and Christopher Welty Evaluating ontological decisions with OntoClean Journal of Communications of the ACM 45 2 2002 61 65 ACM (Pubitemid 135699725)
    • (2002) Communications of the ACM , vol.45 , Issue.2 , pp. 61-65
    • Guarino, N.1    Welty, C.2
  • 38
    • 0002620903 scopus 로고    scopus 로고
    • Identity, unity, and individuation: Towards a formal toolkit for ontological analysis
    • W. Horn, IOS Press Amsterdam
    • Nicola Guarino, and Chris Welty Identity, unity, and individuation: towards a formal toolkit for ontological analysis W. Horn, Proceedings of ECAI-2000: the European conference on artificial intelligence August, 2000 IOS Press Amsterdam 219 223
    • (2000) Proceedings of ECAI-2000: The European Conference on Artificial Intelligence , pp. 219-223
    • Guarino, N.1    Welty, C.2
  • 40
    • 0001875510 scopus 로고    scopus 로고
    • DAML+OIL: A description logic for the semantic web
    • Ian Horrocks DAML+OIL: a description logic for the semantic web IEEE Data Engineering Bulletin 25 1 2002 4 9
    • (2002) IEEE Data Engineering Bulletin , vol.25 , Issue.1 , pp. 4-9
    • Horrocks, I.1
  • 46
    • 0003415244 scopus 로고    scopus 로고
    • RFC 2616 (Last visited April 11, 2014)
    • Hypertext Transfer Protocol - HTTP/1.1 1999 RFC 2616 http://www.w3.org/ Protocols/rfc2616/rfc2616.html/ (Last visited April 11, 2014)
    • (1999) Hypertext Transfer Protocol - HTTP/1.1
  • 48
    • 84903147967 scopus 로고    scopus 로고
    • (Last visited April 12, 2014)
    • Information security vulnerabilities and exposures, intrusion detection (application security), new CVE-ID Format January 1, 2014 http://cve.mitre.org/ (Last visited April 12, 2014)
    • (2014) Journal: IEEE Software
  • 50
    • 84903179972 scopus 로고    scopus 로고
    • Apache Software Foundation Web page at (Last visited Feb 28, 2014)
    • JMeter 2014 Apache Software Foundation Web page at http://jmeter.apache. Org (Last visited Feb 28, 2014)
    • (2014) JMeter
  • 53
    • 79958812210 scopus 로고    scopus 로고
    • 2nd ed. State University of New York at Stony Brook Harold Boley, National Research Council Canada W3C Working Group Note 5
    • Michael Kifer RIF overview 2nd ed. February 2013 State University of New York at Stony Brook Harold Boley, National Research Council Canada W3C Working Group Note 5
    • (2013) RIF Overview
    • Kifer, M.1
  • 62
    • 84903192167 scopus 로고    scopus 로고
    • (Last visited Jan11, 2014)
    • OWASP web application security attacks 2014 https://www.owasp.org/index. php/Category:Attack/ (Last visited Jan11, 2014)
    • (2014) OWASP Web Application Security Attacks
  • 70
    • 0004329576 scopus 로고    scopus 로고
    • The Institute of Electrical and Electronics Engineers New York, USA IEEE Std, No. 1074-1997, ISBN:1-55937-993-6
    • D.J. Schultz IEEE standard for developing software life cycle processes 1997 The Institute of Electrical and Electronics Engineers New York, USA IEEE Std, No. 1074-1997, ISBN:1-55937-993-6
    • (1997) IEEE Standard for Developing Software Life Cycle Processes
    • Schultz, D.J.1
  • 72
    • 84903203102 scopus 로고    scopus 로고
    • "modSecurity core rule set", an open source rule set for generic detection of attacks against web applications
    • Ofer Shezaf "ModSecurity core rule set", an open source rule set for generic detection of attacks against web applications OWASP AppSec Conference 2007
    • (2007) OWASP AppSec Conference
    • Shezaf, O.1
  • 74
    • 34249817069 scopus 로고    scopus 로고
    • Pellet: A practical OWL-DL reasoner
    • DOI 10.1016/j.websem.2007.03.004, PII S1570826807000169, Software Engineering and the Semantic Web
    • Evren Sirin, Bijan Parsia, Bernardo Cuenca Grau, Aditya Kalyanpur, and Yarden Katz Pellet: a practical owl-dl reasoner Journal: Web Semantics: Science, Services and Agents on the World Wide Web 5 2 2007 51 53 Elsevier (Pubitemid 46856283)
    • (2007) Web Semantics , vol.5 , Issue.2 , pp. 51-53
    • Sirin, E.1    Parsia, B.2    Grau, B.C.3    Kalyanpur, A.4    Katz, Y.5
  • 75
    • 84903156888 scopus 로고    scopus 로고
    • OWASP-DV-016 (Last visited Feb 28, 2014)
    • Testing for HTTP splitting/smuggling 2014 OWASP-DV-016 https://www.owasp.org/index.php/Testing-for-HTTP-Splitting/Smuggling (Last visited Feb 28, 2014)
    • (2014) Testing for HTTP Splitting/smuggling
  • 76
    • 58149365542 scopus 로고
    • Towards principles for the design of ontologies used for knowledge sharing
    • R. Gruber Thomas Towards principles for the design of ontologies used for knowledge sharing International Journal of Human-Computer Studies 43 5/6 1995 907 928
    • (1995) International Journal of Human-Computer Studies , vol.43 , Issue.5-6 , pp. 907-928
    • Thomas, R.G.1
  • 77
    • 0002018120 scopus 로고    scopus 로고
    • The firm as a distributed knowledge system: A constructionist approach
    • H. Tsoukas The firm as a distributed knowledge system: a constructionist approach Strategic Management Journal 17 1996 11 25
    • (1996) Strategic Management Journal , vol.17 , pp. 11-25
    • Tsoukas, H.1
  • 83
    • 84869141956 scopus 로고    scopus 로고
    • Report. Verizonenterprise.com.Verizon, Application Security Specific Highlights
    • Chris Wysopal 2012 data breach investigations report Report. Verizonenterprise.com.Verizon, Application Security Specific Highlights March 22, 2012 http://www.veracode.com/blog/2012/03/verizon-data-breach-investigative- report-2012-application-security-specific-highlights/
    • (2012) 2012 Data Breach Investigations Report
    • Wysopal, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.