Ontological vulnerability assessment

被引:0
|
作者
Steele, Aaron [1 ]
机构
[1] Massey Univ, Sch Engn & Adv Technol, Palmerston North, New Zealand
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vulnerability assessment is a vital part of the risk management process. The accuracy and reliability of calculated risk depends on comprehensive and correct assessment of system vulnerabilities. Current vulnerability assessment techniques fail to consider systems in their entirety and consequently are unable to identify complex vulnerabilities (i.e. those vulnerabilities that are due to configuration settings and unique system environments). Complex vulnerabilities call exist for example when a unique combination of system components are present in a system and configured in such a way that they can be collectively misused to compromise a system. Ontologies have emerged as a useful means for modeling domains of interest. This research shows that taking an ontological approach to vulnerability assessment results in improved identification of complex vulnerabilities. By ontologically modeling the domain of vulnerability assessment, the resulting ontology call be instantiated with a system of interest. The process of instantiating the ontology doubles as a technique for methodically discovering complex vulnerabilities present in the given system. Furthermore, it is suggested that the instantiated ontology will also be able to be queried in order to discover additional complex vulnerabilities present in the system by reasoning through implicit knowledge captured by the instantiated ontology.
引用
收藏
页码:24 / 35
页数:12
相关论文
共 50 条
  • [41] An assessment of vulnerability in Alaska groundfish
    Ormseth, Olav A.
    Spencer, Paul D.
    FISHERIES RESEARCH, 2011, 112 (03) : 127 - 133
  • [42] Groundwater Pollution and Vulnerability Assessment
    Kurwadkar, Sudarshan
    WATER ENVIRONMENT RESEARCH, 2017, 89 (10) : 1561 - 1577
  • [43] CORRESPONDENCE: Beyond vulnerability assessment
    Swart, Rob
    Fuss, Sabine
    Obersteiner, Michael
    Ruti, Paolo
    Teichmann, Claas
    Vautard, Robert
    NATURE CLIMATE CHANGE, 2013, 3 (11) : 942 - 943
  • [44] Vulnerability Assessment of Structures and Infrastructures
    Tsompanakis, Yiannis
    STRUCTURE AND INFRASTRUCTURE ENGINEERING, 2010, 6 (1-2) : 1 - 1
  • [45] Scales as a challenge for vulnerability assessment
    Fekete, Alexander
    Damm, Marion
    Birkmann, Joern
    NATURAL HAZARDS, 2010, 55 (03) : 729 - 747
  • [46] A Human Vulnerability Assessment Methodology
    Cullen, Andrea
    Armitage, Lorna
    2018 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2018,
  • [47] ASSESSMENT OF DROUGHT VULNERABILITY IN TAIWAN
    Liou, Yuei-An
    Nguyen, Kim-Anh
    2022 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM (IGARSS 2022), 2022, : 5598 - 5601
  • [48] Security simulation for vulnerability assessment
    Hennessey, Brian
    Norman, Bradley
    Wesson, Robert B.
    2006: 40TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCES SECURITY TECHNOLOGY, PROCEEDINGS, 2006, : 46 - +
  • [49] Assessment of the Ivorian Coastal Vulnerability
    Tano, Rene A.
    Aman, Angora
    Kouadio, K. Yves
    Toualy, Elisee
    Ali, Kouadio E.
    Assamoi, Paul
    JOURNAL OF COASTAL RESEARCH, 2016, 32 (06) : 1495 - 1503
  • [50] Hospital's Vulnerability Assessment
    Guinet, Alain
    Faccincani, Roberto
    2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND SYSTEMS MANAGEMENT (IESM), 2015, : 249 - 254