Ajou University repository

Ontology-driven security requirements recommendation for APT attack
Citations

SCOPUS

8

Citation Export

DC Field Value Language
dc.contributor.authorKim, Min Ju-
dc.contributor.authorDey, Sangeeta-
dc.contributor.authorLee, Seok Won-
dc.date.issued2019-09-01-
dc.identifier.urihttps://aurora.ajou.ac.kr/handle/2018.oak/36471-
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85078041429&origin=inward-
dc.description.abstractAdvanced Persistent Threat (APT) is one of the cyber threats that continuously attack specific targets exfiltrate information or destroy the system [1]. Because the attackers use various tools and methods according to the target, it is difficult to describe APT attack in a single pattern. Therefore, APT attacks are difficult to defend against with general countermeasures. In these days, systems consist of various components and related stakeholders, which makes it difficult to consider all the security concerns. In this paper, we propose an ontology knowledge base and its design process to recommend security requirements based on APT attack cases and system domain knowledge. The proposed knowledge base is divided into three parts; APT ontology, general security knowledge ontology, and domain-specific knowledge ontology. Each ontology can help to understand the security concerns in their knowledge. While integrating three ontologies into the problem domain ontology, the appropriate security requirements can be derived with the security requirements recommendation process. The proposed knowledge base and process can help to derive the security requirements while considering both real attacks and systems.-
dc.language.isoeng-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.subject.meshAdvanced Persistent Threat (APT)-
dc.subject.meshDesign process-
dc.subject.meshDomain-specific knowledge-
dc.subject.meshKnowledge base-
dc.subject.meshKnowledge ontology-
dc.subject.meshProblem domain-
dc.subject.meshSecurity requirements-
dc.subject.meshTools and methods-
dc.titleOntology-driven security requirements recommendation for APT attack-
dc.typeConference-
dc.citation.conferenceDate2019.9.23. ~ 2019.9.27.-
dc.citation.conferenceName27th IEEE International Requirements Engineering Conference Workshops, REW 2019-
dc.citation.editionProceedings - 2019 IEEE 27th International Requirements Engineering Conference Workshops, REW 2019-
dc.citation.endPage156-
dc.citation.startPage150-
dc.citation.titleProceedings - 2019 IEEE 27th International Requirements Engineering Conference Workshops, REW 2019-
dc.identifier.bibliographicCitationProceedings - 2019 IEEE 27th International Requirements Engineering Conference Workshops, REW 2019, pp.150-156-
dc.identifier.doi10.1109/rew.2019.00032-
dc.identifier.scopusid2-s2.0-85078041429-
dc.identifier.urlhttp://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8932374-
dc.subject.keywordAdvanced Persistent Threat (APT)-
dc.subject.keywordKnowledge Base-
dc.subject.keywordOntology-
dc.subject.keywordSecurity Requirement-
dc.type.otherConference Paper-
dc.description.isoafalse-
dc.subject.subareaComputer Networks and Communications-
dc.subject.subareaSoftware-
dc.subject.subareaSafety, Risk, Reliability and Quality-
dc.subject.subareaArtificial Intelligence-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Lee, Seok-Won Image
Lee, Seok-Won이석원
Department of Software and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.