Redirigiendo al acceso original de articulo en 19 segundos...
ARTÍCULO
TITULO

Framework for ontology-driven threat modelling of modern computer systems

Andrei Brazhuk    
Evgeny Olizarovich    

Resumen

Threat modelling of a computer system is based on the system analysis of its architecture on early development stages (requirements, design) and creation of a threat model that represents security aspects of the system (threats and mitigations). Used in this field means, like data flow diagrams (DFD) and Application threat modelling approach (OWASP, Microsoft), are mainly informal and hard to involve automation. In order to overcome these restrictions, we have created the ontology-driven threat modelling (OdTM) framework, which allows to use graphical notation of DFD diagrams and semantic domain-specific threat models to build threat models for different computer systems. Each domain-specific threat model has a set of typical components of some subject area and threats/countermeasures associated with these components. An end user can describe a computer system with DFD diagram(s), then reasoning procedures are able to build a threat model for that system.The OdTM framework consists of a common approach of the architectural security analysis and method of semantic interpretation of DFD diagrams and automatic reasoning of relevant threats and countermeasures. We have developed the base threat model as OWL (Web ontology language) ontology that enables creation of domain-specific threat models as OWL ontologies and extension them with different external knowledge sources (knowledge ?mining?, the Linked Open Data etc.). To illustrate proposed approach, we have used a semantic version of a model that depicts common threats against cloud computer systems.

 Artículos similares

       
 
Eduardo Morales-Vargas, Hayde Peregrina-Barreto, Rita Q. Fuentes-Aguilar, Juan Pablo Padilla-Martinez, Wendy Argelia Garcia-Suastegui and Julio C. Ramirez-San-Juan    
Microvasculature analysis is an important task in the medical field due to its various applications. It has been used for the diagnosis and threat of diseases in fields such as ophthalmology, dermatology, and neurology by measuring relative blood flow or... ver más
Revista: Information

 
Ioana Branescu, Octavian Grigorescu and Mihai Dascalu    
Effectively understanding and categorizing vulnerabilities is vital in the ever-evolving cybersecurity landscape, since only one exposure can have a devastating effect on the entire system. Given the increasingly massive number of threats and the size of... ver más
Revista: Information

 
MohammadMoein Shafi, Arash Habibi Lashkari, Vicente Rodriguez and Ron Nevo    
The distributed denial of service attack poses a significant threat to network security. Despite the availability of various methods for detecting DDoS attacks, the challenge remains in creating real-time detectors with minimal computational overhead. Ad... ver más
Revista: Information

 
Nosa Aikodon, Sandra Ortega-Martorell and Ivan Olier    
Patients in Intensive Care Units (ICU) face the threat of decompensation, a rapid decline in health associated with a high risk of death. This study focuses on creating and evaluating machine learning (ML) models to predict decompensation risk in ICU pat... ver más
Revista: Algorithms

 
Geng Liu, Zhongshan Shen, Xibin Han, Haifeng Wang, Weiwei Chen, Yi Zhang, Pengyun Ma, Yibing Li, Yun Cai, Pengfei Xue, Huafeng Qin and Chunxia Zhang    
The stability of contemporary ice shelves is under threat due to global warming, and the geological records in the Ross Sea offer such an opportunity to test the linkage between them. However, the absence of calcareous microfossils in the sediments of th... ver más