توجه: محتویات این صفحه به صورت خودکار پردازش شده و مقاله‌های نویسندگانی با تشابه اسمی، همگی در بخش یکسان نمایش داده می‌شوند.
۱Predicting Network Attacks Using Ontology–Driven Inference
نویسنده(ها): ،
اطلاعات انتشار: International Journal Information and Communication Technology Research، چهارم،شماره۲، Mar ۲۰۱۲، سال
تعداد صفحات: ۱۰
Graph knowledge models and ontologies are very powerful modeling and reasoning tools. We propose an effective approach to model network attacks and attack prediction which plays important roles in security management. The goals of this study are: First we model network attacks, their prerequisites and consequences using knowledge representation methods in order to provide description logic reasoning and inference over attack domain concepts. And secondly, we propose an ontology–based system which predicts potential attacks using inference and observing information which provided by sensory inputs. We generate our ontology and evaluate corresponding methods using CAPEC, CWE, and CVE hierarchical datasets. Results from experiments show significant capability improvements comparing to traditional hierarchical and relational models. Proposed method also reduces false alarms and improves intrusion detection effectiveness.

۲Ontological Modeling of Radio Frequency Identification(RFID)Attacks
نویسنده(ها): ،
اطلاعات انتشار: International Journal Information and Communication Technology Research، چهارم،شماره۲، Mar ۲۰۱۲، سال
تعداد صفحات: ۱۰
Advances in RFID technology has led to increasing usage of these systems in various applications such as supply chain management, object identification and so on. At the same time, security attacks against these systems have also grown. Employing a common vocabulary for the sensors of RFID intrusion detection systems will be useful for collaborating with each other in identifying security incidents. Ontological approach for defining RFID attacks can obtain this common vocabulary that is understandable for both humans and software agents. In this paper, an ontological modeling of RFID attacks is presented.
نمایش نتایج ۱ تا ۲ از میان ۲ نتیجه