Skip to main content

Immune-Based Network Dynamic Risk Control Strategy Knowledge Ontology Construction

  • Conference paper
  • First Online:
  • 688 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1230))

Abstract

Knowledge base of dynamic risk control strategy based on immunity is a significant effect on effective analysis and defense against illegal network intrusion. How to realize the automatic understanding and processing of computers with control strategy knowledge is of great significance for quickly responding to network security risks. As a kind of knowledge representation tool, ontology can provide support for knowledge sharing, reuse and automatic computer understanding in specific fields, and has been widely used in various fields. This paper first introduces the immune-based network dynamic risk control model and network dynamic risk quantitative evaluation. And then, according to the ontology modeling method of network dynamic risk control strategy knowledge, this paper extracts domain knowledge concepts, attributes, relationships, instances, etc., and constructs domain ontology model, application ontology model, and atom ontology model for the network dynamic risk control strategy knowledge. These ontology models are represented using semantic Web ontology expression languages PDF and OWL, and are constructed using the protégé ontology editing tool. Finally, the important concepts in the knowledge of network dynamic risk control strategy and the relationship between concepts are expressed in the form of graph, so as to help the network security analysts and decision makers to effectively control and make decisions.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. De Castro, L.N., Timmis, J.I.: Artificial immune systems as a novel soft computing paradigm. Soft Comput. J. 7(8), 526–544 (2003)

    Article  Google Scholar 

  2. Jiao, L., Du, H.: Development and prospect of the artificial immune system. Electron. J. 31(10), 1540–1548 (2003)

    Google Scholar 

  3. Xiao, R., Wang, L.: Artificial immune system: principle, models, analysis and perspectives. J. Comput. Sci. 25(12), 1281–1293 (2002)

    Google Scholar 

  4. Wu, L.J., Wu, D.Y., Liu, S.L., Liu, L.: Research on network intrusion knowledge base model based on ontology. Comput. Sci. 40(9), 120–129 (2013)

    Google Scholar 

  5. Obrst, L., Chase, P., Markeloff, R.: Developing an ontology of the cybersecurity domain. In: CEUR Workshop Proceedings, vol. 966, pp. 49–56 (2012)

    Google Scholar 

  6. Iannacone, M., Bohn, S., Nakamura, G., Gerth, J., Huffer, K., Bridges, R., et al.: Developing an ontology for cybersecurity knowledge graphs. In: Proceedings of the 10th Annual Cyber and Information Security Research Conference. ACM. New York (2015)

    Google Scholar 

  7. Jia, Y., Qi, Y., Shang, H., et al.: A practical approach to constructing a knowledge graph for cybersecurity. Engineering 4(1), 53–60 (2018)

    Article  Google Scholar 

  8. Falk, C.: An ontology for threat intelligence. In: European Conference on Cyber Warfare and Security. Academic Conferences International Limited (2016)

    Google Scholar 

  9. Mozzaquatro, B., Agostinho, C., Goncalves, D., et al.: An ontology-based cybersecurity framework for the Internet of Things. Sensors 18(9), 3053 (2018)

    Article  Google Scholar 

  10. Li, T.: An immunity based network security risk estimation. Sci. China Ser. F: Inf. Sci. 48(5), 557–578 (2005)

    MathSciNet  MATH  Google Scholar 

  11. Studer, R., Benjamins, V.R., Fensel, D.: Knowledge engineering: principles and methods. Data Knowl. Eng. 25(1–2), 161–197 (1998)

    Article  Google Scholar 

  12. RDF. https://www.w3.org/TR/2014/NOTE-rdf11-primer-20140624/. Accessed 5 Oct 2019

  13. OWL. https://www.w3.org/TR/2012/REC-owl2-quick-reference-20121211/. Accessed 7 Oct 2019

  14. Protégé. https://protege.stanford.edu/. Accessed 20 Sept 2019

Download references

Acknowledgments

This work was supported in part by the Natural Science Foundation of China (Grant No. U1736212, No. 61572334, No. 61872255), in part by the Sichuan Province Key Research & Development Project of China (Grant No. 2018GZ0183), in part by the Fundamental Research Funds for the Central Universities, and in part by the National key research and development program of China (Grant No. 2016YFB0800600).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tao Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Huang, M., Li, T., Zhao, H., Liu, X., Gao, Z. (2020). Immune-Based Network Dynamic Risk Control Strategy Knowledge Ontology Construction. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Computing. SAI 2020. Advances in Intelligent Systems and Computing, vol 1230. Springer, Cham. https://doi.org/10.1007/978-3-030-52243-8_30

Download citation

Publish with us

Policies and ethics