On the use of Ontology Data for Protecting Critical Infrastructures
Salvato in:
| Pubblicato in: | European Conference on Cyber Warfare and Security (Jun 2018), p. 208 |
|---|---|
| Autore principale: | |
| Altri autori: | , , |
| Pubblicazione: |
Academic Conferences International Limited
|
| Soggetti: | |
| Accesso online: | Citation/Abstract Full Text Full Text - PDF |
| Tags: |
Nessun Tag, puoi essere il primo ad aggiungerne!!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 2077000317 | ||
| 003 | UK-CbPIL | ||
| 035 | |a 2077000317 | ||
| 045 | 2 | |b d20180601 |b d20180630 | |
| 084 | |a 142231 |2 nlm | ||
| 100 | 1 | |a Henriques, João |u Department of Informatics Engineering, University of Coimbra, Portugal | |
| 245 | 1 | |a On the use of Ontology Data for Protecting Critical Infrastructures | |
| 260 | |b Academic Conferences International Limited |c Jun 2018 | ||
| 513 | |a Conference Proceedings | ||
| 520 | 3 | |a Modern societies increasingly depend on products and services provided by Critical Infrastructures (CI) in areas such as energy, telecommunications and transportation, which are considered vital for their wellbeing. These CIs usually rely on Industrial Automation and Control Systems (IACS), which are becoming larger and more complex due to the increasing amount of available heterogeneous data generated by a raising number of interconnected control and monitoring devices and involved processes. The Security Information and Event Management (SIEM) systems in charge of protecting these CI usually collect and process data from specialized sources, such as intrusion detection systems, log sources, honeypots, network traffic analysers and process control software. However, they usually integrate only a small fraction of the whole data sources existing in the CI. Valuable generic data sources such as human resources databases, staff check clocks, outsourced service providers and accounting data usually fall outside the specialized perimeter of SIEM, despite their potential usefulness for achieving a truly holistic perspective on the CI cybersecurity awareness. One of the main reasons for this state of affairs is the difficulty of integrating such data into the SIEM systems, since it is usually dispersed across multiple databases, using different schema and not originally intended for security-related applications. The process of collecting and adapting data from each of those sources would typically require a long and expensive process of conversion from each database. Moreover, since these databases may change over time (e.g. introduction of new Human Resources information systems), the system is difficult not only to setup but also to properly maintain over time. In order to address this gap, in this paper we propose a framework for making this process easier by using a semantic web approach for automated collection and processing of corporate data from multiple heterogeneous sources. This way, it becomes possible to make these data available, at reasonable costs, in a format which is suitable for security management purposes - especially those related with audit compliance and forensic analysis. | |
| 653 | |a Linked Data | ||
| 653 | |a Datasets | ||
| 653 | |a Trends | ||
| 653 | |a Ontology | ||
| 653 | |a Communications traffic | ||
| 653 | |a Data sources | ||
| 653 | |a Relational data bases | ||
| 653 | |a Events planning | ||
| 653 | |a Semantic web | ||
| 653 | |a Human resources | ||
| 653 | |a Access control | ||
| 653 | |a Security management | ||
| 653 | |a Automation | ||
| 653 | |a Clocks | ||
| 653 | |a Forensic engineering | ||
| 653 | |a Resource Description Framework-RDF | ||
| 653 | |a Information management | ||
| 653 | |a Traffic control | ||
| 653 | |a Semantics | ||
| 653 | |a Process controls | ||
| 653 | |a Information systems | ||
| 653 | |a Compliance | ||
| 653 | |a Critical infrastructure | ||
| 653 | |a Cybersecurity | ||
| 653 | |a Forensic analysis | ||
| 653 | |a Databases | ||
| 653 | |a Modern society | ||
| 653 | |a Usefulness | ||
| 653 | |a Well being | ||
| 653 | |a Industrial automation | ||
| 653 | |a Event management | ||
| 653 | |a Telecommunications | ||
| 653 | |a Data processing | ||
| 653 | |a Security | ||
| 653 | |a Control systems | ||
| 653 | |a Information technology | ||
| 653 | |a Interlocking directorates | ||
| 653 | |a Intrusion | ||
| 653 | |a Outsourcing | ||
| 700 | 1 | |a Caldeira, Filipe |u Department of Informatics Engineering, University of Coimbra, Portugal | |
| 700 | 1 | |a Cruz, Tiago |u Department of Informatics Engineering, University of Coimbra, Portugal | |
| 700 | 1 | |a Simões, Paulo |u Department of Informatics Engineering, University of Coimbra, Portugal | |
| 773 | 0 | |t European Conference on Cyber Warfare and Security |g (Jun 2018), p. 208 | |
| 786 | 0 | |d ProQuest |t Political Science Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/2077000317/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text |u https://www.proquest.com/docview/2077000317/fulltext/embedded/6A8EOT78XXH2IG52?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/2077000317/fulltextPDF/embedded/6A8EOT78XXH2IG52?source=fedsrch |