Abstract
Security ontologies have been developed to facilitate the organization and management of security knowledge. A comparison and evaluation of how these ontologies relate to one another is challenging due to their structure, size, complexity, and level of expressiveness. Differences between ontologies can be found on both the ontological and linguistic levels, resulting in errors and inconsistencies (i.e., different concept hierarchies, types of concepts, definitions) when comparing and aligning them. Moreover, many concepts related to security ontologies have not been thoroughly explored and do not fully meet security standards. By using standards, we can ensure that concepts and definitions are unified and coherent. In this study, we address these deficiencies by reviewing existing security ontologies to identify core concepts and relationships. The primary objective of the systematic literature review is to identify core concepts and relationships that are used to describe security issues. We further analyse and map these core concepts and relationships to five security standards (i.e., NIST SP 800-160, NIST SP 800-30 rev.1, NIST SP 800-27 rev.A, ISO/IEC 27001 and NISTIR 8053). As a contribution, this paper provides a set of core concepts and relationships that comply with the standards mentioned above and allow for a new security ontology to be developed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gruber, T.R.: Toward principles for the design of ontologies used for knowledge sharing? Int. J. Hum.-Comput. Stud. 43(4–5), 907–928 (1995)
Kang, W., Liang, Y.: A security ontology with MDA for software development. In: International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 67–74. IEEE, Beijing (2013)
Tsoumas, B., Gritzalis, D.: Towards an ontology-based security management. In: 20th International Conference on Advanced Information Networking and Applications (AINA), pp. 985–992. IEEE, Vienna (2006)
Ross, R.S., McEvilley, M., Oren, J.C.: NIST SP 800-160, Systems Security Engineering Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. NIST, US Department of Commerce, Gaithersburg, MD, USA, Technical report, NIST SP (2016)
Ross, R.S.,: NIST SP 800-30 REV.1: guide for conducting risk assessments. https://csrc.nist.gov/publications/detail/sp/800-30/rev-1/final. Accessed 14 Aug 2022
Stoneburner, G., Hayden, C., Feringa, A.: NIST SP 800–27 Rev. A. Engineering principles for information technology security (a baseline for achieving security), NIST (2017)
ISO/IEC 27001:2013 - Information security management system - requirements, ISO, Technical report (2013)
Garfinkel, S.L.: NISTIR 8053: de-identification of personal information, NIST (2015)
Maxwell, T.A.: Information policy, data mining, and national security: false positives and unidentified negatives. In: 38th Annual Hawaii International Conference on System Sciences, pp. 134c–134c (2005). https://doi.org/10.1109/HICSS.2005.317
Jurisica, I., Mylopoulos, J., Yu, E.: Ontologies for knowledge management: an information systems perspective. Knowl. Inf. Syst. 6(4), 380–401 (2004). https://doi.org/10.1007/s10115-003-0135-4
Mylopoulos, J., Borgida, A., Jarke, M., Koubarakis, M.: Telos: representing knowledge about information systems. ACM Trans. Inf. Syst. 8(4), 325–362 (1990)
Landwehr, C.E., Bull, A.R., McDermott, J.P., Choi, W.S.: A taxonomy of computer program security flaws. ACM Comput. Surv. 26(3), 211–254 (1994)
Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secure Comput. 1(1), 11–33 (2004)
Howard, J., D., Longstaff, T.: A common language for computer security incidents. Sandia National Laboratories, pp. 1–25 (1998)
Donner, M.: Toward a security ontology. IEEE Secur. Priv. 1(3), 6–7 (2003)
Blanco, C., Lasheras, J., Valencia-Garcia, R., Fernández-Medina, E., Alvarez, J., Piattini, M.: A systematic review and comparison of security ontologies. In: 3rd International Conference on Availability. Reliability and Security (ARES), pp. 813–820. IEEE, Barcelona (2008)
Herzog, A., Shahmehri, N., Duma, C.: An ontology of information security. Int. J. Inf. Secur. Priv. 1(4), 1–23 (2007)
Undercoffer, J., Joshi, A., Pinkston, J.: Modeling computer attacks: an ontology for intrusion detection. In: Vigna, G., Kruegel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 113–135. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45248-5_7
Geneiatakis, D., Lambrinoudakis, C.: An ontology description for SIP security flaws. Comput. Commun. 30(6), 1367–1374 (2007)
Noy, N.F., McGuinness D.L.: Ontology development 101: a guide to creating your first ontology, pp. 1–25 (2001)
Souag, A., Salinesi, C., Comyn-Wattiau, I.: Ontologies for security requirements: a literature survey and classification. In: Bajec, M., Eder, J. (eds.) CAiSE 2012. LNBIP, vol. 112, pp. 61–69. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31069-0_5
Boinski, T., Orlowski, P., Szymanski, J., Krawczyk, H.: Security ontology construction and integration. In: Filipe, J., Dietz, J.L.G. (eds.) International Conference on Knowledge Engineering and Ontology Development (KEOD), pp. 369–374. INSTICC, Paris (2011)
Nguyen, V.: Ontologies and information systems: a literature survey. DSTO-TN-1002, Defence Science and Technology Organisation, Edingubrgh, SA, pp. 66–92 (2011)
Blanco, C., Lasheras, J., Fernández-Medina, E., Valencia-García, R., Toval, A.: Basis for an integrated security ontology according to a systematic review of existing proposals. Comput. Stand. Int. 33, 372–388 (2011)
Kitchenham, B.: Procedures for performing systematic reviews. Keele UK Keele Univ. 33(2004), 1–26 (2004)
IEEE Xplore. https://www.ieee.org. Accessed 14 Aug 2022
Scopus. https://www.scopus.com/search/form.uri?display=basic. Accessed 14 Aug 2022
Web of Science. https://www.webofscience.com/. Accessed 14 Aug 2022
Adach, M., Hänninen, K., Lundqvist, K.: Search results of security ontologies 1988–2022, Technical report, MDU, Västerås. https://www.es.mdh.se/pdf_publications/6424.pdf. Accessed 14 Aug 2022
Schumacher, M.: 6. Toward a security core ontology. In: Schumacher, M. (ed.) Security Engineering with Patterns. LNCS, vol. 2754, pp. 87–96. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45180-8_6
Dritsas, S., et al.: Employing ontologies for the development of security critical applications. In: Funabashi, M., Grzech, A. (eds.) I3E 2005. IIFIP, vol. 189, pp. 187–201. Springer, Boston, MA (2005). https://doi.org/10.1007/0-387-29773-1_13
Fenz, S., Ekelhart, A.: formalizing information security knowledge. In: Proceedings of the 4th International Symposium on Information. Computer, and Communications Security (ASIACCS), pp. 183–194. ACM, New York (2009)
Wang, J.A., Guo, M.: OVM: an ontology for vulnerability management. In: 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies (CSIIRW), Oak Ridge Tennessee, USA, pp. 1–4 (2009)
Pereira, T., Santos, H.: An ontology approach in designing security information systems to support organizational security risk knowledge. In: International Conference on Knowledge Engineering and Ontology Development (KEOD). SSEO, vol. 1, pp. 461–466, ScitePress, Barcelona (2012)
ISO/IEC_JTC1 27005:2008: information technology - security techniques - information security risk management, ISO, Technical report (2008)
Ramanauskaite, S., Olifer, D., Goranin, N., Cenys, A.: Security ontology for adaptive mapping of security standards. Int. J. Comput. Commun. 8(6), 813–825 (2013)
Agrawal, V.: Towards the ontology of ISO/IEC 27005: 2011 risk management standard. HAISA, Frankfurt, Germany, pp. 101–111 (2016)
ISSA-UK. Information security for small and medium-sized enterprises, Information System Security Association, Technical report (2011)
Paulsen, C., Toth, P.: NISTIR 7621 small business information security: the fundamentals. NIST, US Department of Commerce (2016)
Payment card industry data security standard (PCIDSS), PCI-Security Standard Council, Technical report (2006). https://www.commerce.uwo.ca/pdf/PCI_DSS_v3-2-1.pdf. Accessed 14 Aug 2022
ISO/IEC 27005:2011 - information technology—security techniques—information security risk management, ISO, Technical report (2011)
Acknowledgment
This work is supported by the projects: Serendipity - Secure and dependable platforms for autonomy, grant nr: RIT17-0009, funded by the Swedish Foundation for Strategic Research (SSF) and by the DPAC - Dependable Platform for Autonomous Systems and Control, grant nr: 20150022, funded by the Knowledge foundation (KKS).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Adach, M., Hänninen, K., Lundqvist, K. (2022). Security Ontologies: A Systematic Literature Review. In: Almeida, J.P.A., Karastoyanova, D., Guizzardi, G., Montali, M., Maggi, F.M., Fonseca, C.M. (eds) Enterprise Design, Operations, and Computing. EDOC 2022. Lecture Notes in Computer Science, vol 13585. Springer, Cham. https://doi.org/10.1007/978-3-031-17604-3_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-17604-3_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-17603-6
Online ISBN: 978-3-031-17604-3
eBook Packages: Computer ScienceComputer Science (R0)