Cyberattack ontology: a knowledge representation for cyber supply chain security

Abel, Yeboah-Ofori ORCID: https://orcid.org/0000-0001-8055-9274, Umar, Mukhtar Ismail, Tymoteusz, Swidurski and Francisca, Opoku-Boateng (2021) Cyberattack ontology: a knowledge representation for cyber supply chain security. In: 2021 International Conference on Computing, Computational Modelling and Applications (ICCMA), 14-16 Jul 2021, Brest, France.

[img]
Preview
PDF
Cyberattack Ontology for CSC Security - IEEE ICCMA -39A.pdf - Accepted Version

Download (367kB) | Preview

Abstract

Cyberattacks on cyber supply chain (CSC) systems and the cascading impacts have brought many challenges and different threat levels with unpredictable consequences. The embedded networks nodes have various loopholes that could be exploited by the threat actors leading to various attacks, risks, and the threat of cascading attacks on the various systems. Key factors such as lack of common ontology vocabulary and semantic interoperability of cyberattack information, inadequate conceptualized ontology learning and hierarchical approach to representing the relationships in the CSC security domain has led to explicit knowledge representation. This paper explores cyberattack ontology learning to describe security concepts, properties and the relationships required to model security goal. Cyberattack ontology provides a semantic mapping between different organizational and vendor security goals has been inherently challenging. The contributions of this paper are threefold. First, we consider CSC security modelling such as goal, actor, attack, TTP, and requirements using semantic rules for logical representation. Secondly, we model a cyberattack ontology for semantic mapping and knowledge representation. Finally, we discuss concepts for threat intelligence and knowledge reuse. The results show that the cyberattack ontology concepts could be used to improve CSC security.

Item Type: Conference or Workshop Item (Paper)
ISBN: 9781665425674
Identifier: 10.1109/iccma53594.2021.00019
Page Range: pp. 65-70
Additional Information: © 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Uncontrolled Keywords: Cyberattack Ontology; Cyber Supply Chain; Cyber Security; Knowledge Representation; Threat Intelligenc
Subjects: Computing > Information security > Cyber security
Related URLs:
Depositing User: Dr Abel Yeboah-Ofori
Date Deposited: 24 Nov 2021 05:30
Last Modified: 30 Nov 2021 13:58
URI: http://repository.uwl.ac.uk/id/eprint/8448

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu