Ontological vulnerability assessment

被引:0
|
作者
Steele, Aaron [1 ]
机构
[1] Massey Univ, Sch Engn & Adv Technol, Palmerston North, New Zealand
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vulnerability assessment is a vital part of the risk management process. The accuracy and reliability of calculated risk depends on comprehensive and correct assessment of system vulnerabilities. Current vulnerability assessment techniques fail to consider systems in their entirety and consequently are unable to identify complex vulnerabilities (i.e. those vulnerabilities that are due to configuration settings and unique system environments). Complex vulnerabilities call exist for example when a unique combination of system components are present in a system and configured in such a way that they can be collectively misused to compromise a system. Ontologies have emerged as a useful means for modeling domains of interest. This research shows that taking an ontological approach to vulnerability assessment results in improved identification of complex vulnerabilities. By ontologically modeling the domain of vulnerability assessment, the resulting ontology call be instantiated with a system of interest. The process of instantiating the ontology doubles as a technique for methodically discovering complex vulnerabilities present in the given system. Furthermore, it is suggested that the instantiated ontology will also be able to be queried in order to discover additional complex vulnerabilities present in the system by reasoning through implicit knowledge captured by the instantiated ontology.
引用
收藏
页码:24 / 35
页数:12
相关论文
共 50 条
  • [21] The Vulnerability of the Human Condition: Ontological-Relational Dimensions and Ethical-Political Challenges
    Tibaldeo, Roberto Franzini
    TEORIA-RIVISTA DI FILOSOFIA, 2023, 43 (01): : 89 - 108
  • [22] Legal vulnerability of assessment tools
    Tweed, M
    Miola, J
    MEDICAL TEACHER, 2001, 23 (03) : 312 - 314
  • [23] Vulnerability assessment in wireless networks
    Henning, RR
    2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2003, : 358 - 362
  • [24] Nitrate vulnerability assessment of aquifers
    Hansen, Birgitte
    Sonnenborg, Torben O.
    Moller, Ingelise
    Bernth, Jens Demant
    Hoyer, Anne-Sophie
    Rasmussen, Per
    Sandersen, Peter B. E.
    Jorgensen, Flemming
    ENVIRONMENTAL EARTH SCIENCES, 2016, 75 (12)
  • [25] VULNERABILITY ASSESSMENT OF INFINIBAND NETWORKING
    Schmitt, Daryl
    Graham, Scott
    Sweeney, Patrick
    Mills, Robert
    CRITICAL INFRASTRUCTURE PROTECTION XIII, 2019, 570 : 179 - 205
  • [26] Vulnerability Assessment and Patching Management
    Altaf, Insha
    Dar, Jawad Ahmad
    ul Rashid, Firdous
    Rafiq, Mohd.
    2015 INTERNATIONAL CONFERENCE ON SOFT COMPUTING TECHNIQUES AND IMPLEMENTATIONS (ICSCTI), 2015,
  • [27] Security simulation for vulnerability assessment
    Hennessey, Brian
    Wesson, Robert B.
    Norman, Bradley
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2007, 22 (09) : 11 - 16
  • [28] Automated and safe vulnerability assessment
    Guo, FL
    Yu, Y
    Chiueh, T
    21st Annual Computer Security Applications Conference, Proceedings, 2005, : 135 - 144
  • [29] Scales as a challenge for vulnerability assessment
    Alexander Fekete
    Marion Damm
    Jörn Birkmann
    Natural Hazards, 2010, 55 : 729 - 747
  • [30] Groundwater Vulnerability to Pollution Assessment
    Canora, Filomena
    Sdao, Francesco
    WATER, 2022, 14 (14)