loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Jorge E. López de Vergara 1 ; Enrique Vázquez 2 and Javier Guerra 2

Affiliations: 1 Escuela Politécnica Superior, Universidad Autónoma de Madrid, Spain ; 2 E.T.S.I. de Telecomunicación, Universidad Politécnica de Madrid, Spain

Keyword(s): Attack reaction, policy instantiation, ontology, OrBAC, IDMEF, OWL, SWRL.

Related Ontology Subjects/Areas/Topics: Access Control ; Data Engineering ; Databases and Data Security ; Information and Systems Security ; Insider Threats and Countermeasures ; Internet Technology ; Intrusion Detection & Prevention ; Web Information Systems and Technologies

Abstract: A quick and efficient reaction to an attack is important to address the evolution of security incidents in current communication networks. The ReD (Reaction after Detection) project’s aim is to design solutions that enhance the detection/reaction security process. This will improve the overall resilience of IP networks to attacks, helping telecommunication and service providers to maintain sufficient quality of service to comply with service level agreements. A main component within this project is in charge of instantiating new security policies that counteract the network attacks. This paper proposes an ontology-based methodology for the instantiation of these security policies. This approach provides a way to map alerts into attack contexts, which are later used to identify the policies to be applied in the network to solve the threat. For this, ontologies to describe alerts and policies are defined, using inference rules to perform such mappings.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.133.147.87

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
E. López de Vergara, J.; Vázquez, E. and Guerra, J. (2008). SECURITY POLICY INSTANTIATION TO REACT TO NETWORK ATTACKS - An Ontology-based Approach using OWL and SWRL. In Proceedings of the International Conference on Security and Cryptography (ICETE 2008) - SECRYPT; ISBN 978-989-8111-59-3; ISSN 2184-3236, SciTePress, pages 78-83. DOI: 10.5220/0001929300780083

@conference{secrypt08,
author={Jorge {E. López de Vergara}. and Enrique Vázquez. and Javier Guerra.},
title={SECURITY POLICY INSTANTIATION TO REACT TO NETWORK ATTACKS - An Ontology-based Approach using OWL and SWRL},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2008) - SECRYPT},
year={2008},
pages={78-83},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001929300780083},
isbn={978-989-8111-59-3},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2008) - SECRYPT
TI - SECURITY POLICY INSTANTIATION TO REACT TO NETWORK ATTACKS - An Ontology-based Approach using OWL and SWRL
SN - 978-989-8111-59-3
IS - 2184-3236
AU - E. López de Vergara, J.
AU - Vázquez, E.
AU - Guerra, J.
PY - 2008
SP - 78
EP - 83
DO - 10.5220/0001929300780083
PB - SciTePress