Abstract
Knowledge base of dynamic risk control strategy based on immunity is a significant effect on effective analysis and defense against illegal network intrusion. How to realize the automatic understanding and processing of computers with control strategy knowledge is of great significance for quickly responding to network security risks. As a kind of knowledge representation tool, ontology can provide support for knowledge sharing, reuse and automatic computer understanding in specific fields, and has been widely used in various fields. This paper first introduces the immune-based network dynamic risk control model and network dynamic risk quantitative evaluation. And then, according to the ontology modeling method of network dynamic risk control strategy knowledge, this paper extracts domain knowledge concepts, attributes, relationships, instances, etc., and constructs domain ontology model, application ontology model, and atom ontology model for the network dynamic risk control strategy knowledge. These ontology models are represented using semantic Web ontology expression languages PDF and OWL, and are constructed using the protégé ontology editing tool. Finally, the important concepts in the knowledge of network dynamic risk control strategy and the relationship between concepts are expressed in the form of graph, so as to help the network security analysts and decision makers to effectively control and make decisions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
De Castro, L.N., Timmis, J.I.: Artificial immune systems as a novel soft computing paradigm. Soft Comput. J. 7(8), 526–544 (2003)
Jiao, L., Du, H.: Development and prospect of the artificial immune system. Electron. J. 31(10), 1540–1548 (2003)
Xiao, R., Wang, L.: Artificial immune system: principle, models, analysis and perspectives. J. Comput. Sci. 25(12), 1281–1293 (2002)
Wu, L.J., Wu, D.Y., Liu, S.L., Liu, L.: Research on network intrusion knowledge base model based on ontology. Comput. Sci. 40(9), 120–129 (2013)
Obrst, L., Chase, P., Markeloff, R.: Developing an ontology of the cybersecurity domain. In: CEUR Workshop Proceedings, vol. 966, pp. 49–56 (2012)
Iannacone, M., Bohn, S., Nakamura, G., Gerth, J., Huffer, K., Bridges, R., et al.: Developing an ontology for cybersecurity knowledge graphs. In: Proceedings of the 10th Annual Cyber and Information Security Research Conference. ACM. New York (2015)
Jia, Y., Qi, Y., Shang, H., et al.: A practical approach to constructing a knowledge graph for cybersecurity. Engineering 4(1), 53–60 (2018)
Falk, C.: An ontology for threat intelligence. In: European Conference on Cyber Warfare and Security. Academic Conferences International Limited (2016)
Mozzaquatro, B., Agostinho, C., Goncalves, D., et al.: An ontology-based cybersecurity framework for the Internet of Things. Sensors 18(9), 3053 (2018)
Li, T.: An immunity based network security risk estimation. Sci. China Ser. F: Inf. Sci. 48(5), 557–578 (2005)
Studer, R., Benjamins, V.R., Fensel, D.: Knowledge engineering: principles and methods. Data Knowl. Eng. 25(1–2), 161–197 (1998)
RDF. https://www.w3.org/TR/2014/NOTE-rdf11-primer-20140624/. Accessed 5 Oct 2019
OWL. https://www.w3.org/TR/2012/REC-owl2-quick-reference-20121211/. Accessed 7 Oct 2019
Protégé. https://protege.stanford.edu/. Accessed 20 Sept 2019
Acknowledgments
This work was supported in part by the Natural Science Foundation of China (Grant No. U1736212, No. 61572334, No. 61872255), in part by the Sichuan Province Key Research & Development Project of China (Grant No. 2018GZ0183), in part by the Fundamental Research Funds for the Central Universities, and in part by the National key research and development program of China (Grant No. 2016YFB0800600).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Huang, M., Li, T., Zhao, H., Liu, X., Gao, Z. (2020). Immune-Based Network Dynamic Risk Control Strategy Knowledge Ontology Construction. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Computing. SAI 2020. Advances in Intelligent Systems and Computing, vol 1230. Springer, Cham. https://doi.org/10.1007/978-3-030-52243-8_30
Download citation
DOI: https://doi.org/10.1007/978-3-030-52243-8_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-52242-1
Online ISBN: 978-3-030-52243-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)