Ontological vulnerability assessment

被引:0
|
作者
Steele, Aaron [1 ]
机构
[1] Massey Univ, Sch Engn & Adv Technol, Palmerston North, New Zealand
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vulnerability assessment is a vital part of the risk management process. The accuracy and reliability of calculated risk depends on comprehensive and correct assessment of system vulnerabilities. Current vulnerability assessment techniques fail to consider systems in their entirety and consequently are unable to identify complex vulnerabilities (i.e. those vulnerabilities that are due to configuration settings and unique system environments). Complex vulnerabilities call exist for example when a unique combination of system components are present in a system and configured in such a way that they can be collectively misused to compromise a system. Ontologies have emerged as a useful means for modeling domains of interest. This research shows that taking an ontological approach to vulnerability assessment results in improved identification of complex vulnerabilities. By ontologically modeling the domain of vulnerability assessment, the resulting ontology call be instantiated with a system of interest. The process of instantiating the ontology doubles as a technique for methodically discovering complex vulnerabilities present in the given system. Furthermore, it is suggested that the instantiated ontology will also be able to be queried in order to discover additional complex vulnerabilities present in the system by reasoning through implicit knowledge captured by the instantiated ontology.
引用
收藏
页码:24 / 35
页数:12
相关论文
共 50 条
  • [31] Quantitative Robustness for Vulnerability Assessment
    Girol, Guillaume
    Lacombe, Guilhem
    Bardin, Sebastien
    PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2024, 8 (PLDI):
  • [32] Security simulation for vulnerability assessment
    Hennessey, Brian
    Norman, Bradley
    Wesson, Robert B.
    ENABLING TECHNOLOGIES FOR SIMULATION SCIENCE X, 2006, 6227
  • [33] Nitrate vulnerability assessment of aquifers
    Birgitte Hansen
    Torben O. Sonnenborg
    Ingelise Møller
    Jens Demant Bernth
    Anne-Sophie Høyer
    Per Rasmussen
    Peter B.E. Sandersen
    Flemming Jørgensen
    Environmental Earth Sciences, 2016, 75
  • [34] On the vulnerability assessment of monumental buildings
    Sergio Lagomarsino
    Bulletin of Earthquake Engineering, 2006, 4 : 445 - 463
  • [35] VULNERABILITY ASSESSMENT OF FUZZY TARGETS
    CELMINS, A
    FUZZY SETS AND SYSTEMS, 1994, 68 (01) : 29 - 38
  • [36] GNSS Vulnerability Analysis and Assessment
    Zhao, Xin
    Zhan, Xingqun
    Liu, Xuan
    Li, SheJun
    JOURNAL OF AERONAUTICS ASTRONAUTICS AND AVIATION, 2014, 46 (01): : 11 - 19
  • [37] Vulnerability Assessment of Snowstorm in Altay
    Sun, Guili
    Cao, Zhen
    Li, Lu
    Lu, Haiyan
    PROCEEDINGS OF THE FIFTH SYMPOSIUM OF RISK ANALYSIS AND RISK MANAGEMENT IN WESTERN CHINA (WRARM 2017), 2017, 152 : 1 - 6
  • [38] Vulnerability assessment within BMS
    Small, EP
    Chase, SB
    PROBABILISTIC MECHANICS & STRUCTURAL RELIABILITY: PROCEEDINGS OF THE SEVENTH SPECIALTY CONFERENCE, 1996, : 446 - 449
  • [39] Vulnerability Assessment of Sensor Systems
    Bialas, Andrzej
    SENSORS, 2019, 19 (11):
  • [40] On the vulnerability assessment of monumental buildings
    Lagomarsino, Sergio
    BULLETIN OF EARTHQUAKE ENGINEERING, 2006, 4 (04) : 445 - 463