Using DAML+OIL to classify intrusive behaviours

  • Authors:
  • Jeffrey Undercoffer;Anupam Joshi;Tim Finin;John Pinkston

  • Affiliations:
  • Department of Computer Science and Electrical Engineering, University of Maryland Baltimore County, 1000 Hilltop Circle, Baltimore, MD-21250, USA/ email: undercoffer&commat/umbc.edu, joshi&commat/ ...;Department of Computer Science and Electrical Engineering, University of Maryland Baltimore County, 1000 Hilltop Circle, Baltimore, MD-21250, USA/ email: undercoffer&commat/umbc.edu, joshi&commat/ ...;Department of Computer Science and Electrical Engineering, University of Maryland Baltimore County, 1000 Hilltop Circle, Baltimore, MD-21250, USA/ email: undercoffer&commat/umbc.edu, joshi&commat/ ...;Department of Computer Science and Electrical Engineering, University of Maryland Baltimore County, 1000 Hilltop Circle, Baltimore, MD-21250, USA/ email: undercoffer&commat/umbc.edu, joshi&commat/ ...

  • Venue:
  • The Knowledge Engineering Review
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

We have produced an ontology specifying a model of computer attack. Our ontology is based upon an analysis of over 4000 classes of computer intrusions and their corresponding attack strategies and is categorised according to system component targeted, means of attack, consequence of attack and location of attacker. We argue that any taxonomic characteristics used to define a computer attack be limited in scope to those features that are observable and measurable at the target of the attack. We present our model as a target-centric ontology that is to be refined and expanded over time. We state the benefits of forgoing dependence upon taxonomies in favour of ontologies for the classification of computer attacks and intrusions. We have specified our ontology using the DARPA Agent Markup Language+Ontology Inference Layer and have prototyped it using DAMLJessKB. We present our model as a target-centric ontology and illustrate the benefits of utilising an ontology in lieu of a taxonomy, by presenting a use-case scenario of a distributed intrusion detection system.