
 
Russian Foundation of Basic Research (projects 
#10-01-00826 and #11-07-00435), the Program of 
fundamental research of the Department for 
Nanotechnologies and Informational Technologies 
of the Russian Academy of Sciences, the State 
contract #11.519.11.4008 and by the EU as part of 
the SecFutur and MASSIF projects. 
REFERENCES 
AccelOps, 2011. AccelOps Security Information & Event 
Management (SIEM). http://www.accelops.com/ 
product/siem.php. 
AlienVault, 2011. AlienVault Unified SIEM System 
description. AlienVault, Campbell, CA. 36 p. 
Buecker, A., Amado, J., Druker, D., Lorenz C., 
Muehlenbrock, F., Tan, R., 2010. IT Security 
Compliance Management Design Guide with IBM 
Tivoli Security Information and Event Manager. IBM 
Redbooks.  
CIM, 2011. Common Information Model (CIM), DMTF. 
Website. http://dmtf.org/standards/ cim.  
Elahi, G., Yu, E., Zannone, N., 2009. A Modeling 
Ontology for Integrating Vulnerabilities into Security 
Requirements Conceptual Foundations. In ER'09 Proc. 
28th International Conference on Conceptual 
Modeling. Springer-Verlag Berlin, Heidelberg. 
Guo, M, Wang, J, 2009. An Ontology-based Approach to 
Model Common Vulnerabilities and Exposures in 
Information Security. In ASEE Southeast Section 
Conference. 
Heimbigner, 2011. D. DMTF - CIM to OWL: A Case 
Study in Ontology Conversion. http:// 
www.docstoc.com/docs/23281194/DMTF---CIM-to-
OWL-A-Case-Study-in-Ontology-Conversion. 
Ingols, K., Chu, M., Lippmann, R., Webster, S., Boyer, S., 
2009. Modeling modern network attacks and 
countermeasures using attack graphs. In Proceedings 
of the 2009 Annual Computer Security Applications 
Conference (ACSAC ’09), Washington, D.C., USA, 
IEEE Computer Society. 
Kakas, A., Kowalski, R., Toni, F., 2003. Abductive Logic 
Programming. In Journal of Logic and Computation, 
V.2, No.6. 
Kotenko, I., Stepashkin, M., 2006. Attack Graph based 
Evaluation of Network Security. In Lecture Notes in 
Computer Science, Vol. 4237, 2006.  
Kowalski, R., Sergot, M., 1986. A logic-based calculus of 
events. New Generation Computing, V.4. 
Li, Z., Chu, C.-H., Yao, W., Behr, R. A., 2010. Ontology-
Driven Event Detection and Indexing in Smart Spaces. 
In  The 4th IEEE International Conference on 
Semantic Computing, September 22-24, Carnegie 
Mellon University, Pittsburgh, PA, USA. 
López de Vergara, J., Villagrá, V., Berrocal, J., 2004. 
Applying the Web Ontology Language to management 
information definitions. In IEEE Communications 
Magazine. Vol.42, pp.58-74.  
Marco, D., Jennings, M., 2004. Universal Meta Data 
Models. Wiley. 
MASSIF, 2011. Website. http://www.massif-project.eu. 
Miller, D., Harris, S., Harper, A., VanDyke, S., Blask, C., 
2011.  Security information and event management 
(SIEM) implementation. McGraw-Hill Companies. 
Novell, 2010. Novell Sentinel Log Manager 1.0.0.5. 
Installation Guide. 
Ogle, D., Kreger, H., Salahshour, A., Cornpropst, J., 
Labadie, E., Chessell, M., Horn, B., Gerken, J., 
Schoech, J., Wamboldt, M., 2004. 
Canonical Situation 
Data Format: The Common Base Event V1.0.1. 
International Business Machines Corporation. 
OWL, 2009. OWL 2 Web Ontology Language Document 
Overview. W3C Recommendation 27 October 2009. 
http://www.w3.org/TR/owl2-overview .  
Parmelee, M, 2010.  Toward an Ontology Architecture for 
Cyber-Security Standards. The MITRE Corporation. 
Parsia, B., 2005. Cautiously Approaching SWRL. 
http://en.wikipedia.org/wiki/PDF. 
Prelude, 2011. Prelude Pro 1.0. http://www.prelude-
technologies.com/en/welcome/index.html 
RDF, 2004. RDF Vocabulary Description Language 1.0: 
RDF Schema. W3C Recommendation 10 February 
2004. http://www.w3.org/TR/rdf-schema. 
SCAP, 2011. The Security Content Automation Protocol 
(SCAP). Website. http://scap.nist.gov.  
Shenk, J., 2009. ArcSight Logger 4. Combat Cybercrime, 
Demonstrate Compliance and Streamline IT 
Operations. A SANS Whitepaper. January 2009. 
http://www.arcsight.com/collateral/whitepapers/ArcSi
ght_Combat_Cyber_Crime_with_Logger.pdf .  
SPARQL, 2008. SPARQL Query Language for RDF. 
W3C Recommendation, 15 January 2008. 
http://www.w3.org/TR/rdf-sparql-query 
SPIN, 2012. ON-THE-FLY, LTL MODEL CHECKING 
with SPIN. http://spinroot.com/spin/whatispin.html 
Stevens, M, 2005. Security Information and Event 
Management (SIEM). In The NEbraskaCERT 
Conference, August 9-11, 2005. http://www.certconf. 
org/presentations/2005/files/WC4.pdf. 
SWRL, 2004. SWRL: A Semantic Web Rule Language 
Combining OWL and RuleML. W3C Member 
Submission 21 May 2004. 
http://www.w3.org/Submission/SWRL/ 
Teymourian, K., Paschke, A., 2009. Towards Semantic 
Event Processing. In Proceedings of the Third ACM 
International Conference on Distributed Event-Based 
Systems (DEBS '09). ACM. New York. 
Triplestore, 2010. Triple Store Evaluation Analysis 
Report. Revelytix, Inc.  
Vernooy-Gerritsen, M., 2009. Emerging Standards for 
Enhanced Publications and Repository Technology. 
Amsterdam University Press. 
Virtuoso, 2012. http://virtuoso.openlinksw.com 
DataRepositoryforSecurityInformationandEventManagementinServiceInfrastructures
313