Abstract
Ontology enables semantic interoperability, making it highly valuable for cyber threat hunting. Community-driven frameworks like MITRE ATT &CK, D3FEND, ENGAGE, CWE and CVE have been developed to combat cyber threats. However, manually navigating these independent data sources is time-consuming and impractical in high-stakes situations. By adopting an ontology-based approach, these cybersecurity resources can be unified, enabling a holistic view of the threat landscape. Additionally, leveraging semantic query languages empowers analysts to make the most of existing data sources. This paper explores how through the application of a semantic query language (SPARQL) on a unified cybersecurity ontology, analysts can effectively exploit the information contained within these resources to strengthen their defense strategies against cyber threats.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Akbar, K.A., Halim, S.M., Hu, Y., Singhal, A., Khan, L., Thuraisingham, B.: Knowledge mining in cybersecurity: from attack to defense. In: Sural, S., Lu, H. (eds.) DBSec 2022. LNCS, vol. 13383, pp. 110–122. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-10684-2_7
Akbar, K.A., Halim, S.M., Singhal, A., Abdeen, B., Khan, L., Thuraisingham, B.: The design of an ontology for ATT &CK and its application to cybersecurity. In: Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy [Poster Presentation], pp. 295–297 (2023)
MITRE Corporation: Common weakness enumeration. https://cwe.mitre.org/
MITRE Corporation: A knowledge graph of cybersecurity countermeasures. https://d3fend.mitre.org/
MITRE Corporation: Mapping the engage matrix to MITRE ATT &CK. https://engage.mitre.org/wp-content/uploads/2022/05/Mapping-Engage-to-ATTCK.pdf
MITRE Corporation: MITRE ATT &CK. https://attack.mitre.org/
MITRE Corporation: MITRE engage. https://engage.mitre.org/
MITRE Corporation: Science of cyber-security. https://irp.fas.org/agency/dod/jason/cyber.pdf
MITRE Corporation: The ultimate security vulnerability data source. https://www.cvedetails.com
NIST CSRC: Advanced persistent threat. https://csrc.nist.gov/glossary/term/advanced_persistent_threat
Hemberg, E., et al.: Linking threat tactics, techniques, and patterns with defensive weaknesses, vulnerabilities and affected platform configurations for cyber hunting. arXiv preprint arXiv:2010.00533 (2020)
Iannacone, M., et al.: Developing an ontology for cyber security knowledge graphs. In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, pp. 1–4 (2015)
Khan, L., McLeod, D., Hovy, E.: Retrieval effectiveness of an ontology-based model for information selection. VLDB J. 13, 71–85 (2004)
Luo, F.: Ontology construction for information selection. In: 2002 Proceedings of the 14th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2002), pp. 122–127. IEEE (2002)
Mavroeidis, V., Bromander, S.: Cyber threat intelligence model: an evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence. In: 2017 European Intelligence and Security Informatics Conference (EISIC), pp. 91–98. IEEE (2017)
Mozzaquatro, B.A., Agostinho, C., Goncalves, D., Martins, J., Jardim-Goncalves, R.: An ontology-based cybersecurity framework for the internet of things. Sens. (Basel Switz.) 18(9), 3053 (2017). https://doi.org/10.3390/s18093053
Obrst, L., Chase, P., Markeloff, R.: Developing an ontology of the cyber security domain. In: Semantic Technologies for Intelligence, Defense, and Security (STIDS), pp. 49–56 (2012)
Oltramari, A., Cranor, L.F., Walls, R.J., McDaniel, P.D.: Building an ontology of cyber security. In: Semantic Technologies for Intelligence, Defense, and Security (STIDS), pp. 54–61 (2014)
Salatino, A.A., Thanapalasingam, T., Mannocci, A., Birukou, A., Osborne, F., Motta, E.: The computer science ontology: a comprehensive automatically-generated taxonomy of research areas. Data Intell. 2(3), 379–416 (2020)
Shlapentokh-Rothman, M., Kelly, J., Baral, A., Hemberg, E., O’Reilly, U.M.: Coevolutionary modeling of cyber attack patterns and mitigations using public datasets. In: Proceedings of the Genetic and Evolutionary Computation Conference, pp. 714–722 (2021)
Strom, B.E., et al.: Finding cyber threats with ATT &CK-based analytics. The MITRE Corporation, Bedford, MA, Technical report No. MTR170202 (2017)
Syed, Z., Padia, A., Finin, T., Mathews, L., Joshi, A.: UCO: a unified cybersecurity ontology. UMBC Student Collection (2016)
Tomaszuk, D., Hyland-Wood, D.: RDF 1.1: knowledge representation and data integration language for the web. Symmetry 12(1), 84 (2020)
World Wide Web Consortium (W3C): OWL web ontology language guide. Technical report, World Wide Web Consortium (2004). https://www.w3.org/TR/owl-guide/
World Wide Web Consortium (W3C): SPARQL query language for RDF. Technical report, World Wide Web Consortium (2008). https://www.w3.org/TR/rdf-sparql-query/
World Wide Web Consortium (W3C): Resource description framework (RDF). Technical report, World Wide Web Consortium (2014). https://www.w3.org/RDF/
Zou, Q., Sun, X., Liu, P., Singhal, A.: An approach for detection of advanced persistent threat attacks. Computer 53(12), 92–96 (2020)
Acknowledgement
The research reported herein was supported in part by NIST Award # 60NANB23D007, NSF awards DMS-1737978, DGE-2039542, OAC-1828467, OAC-1931541, and DGE-1906630, ONR awards N00014-17-1-2995 and N00014-20-1-2738.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Ethics declarations
Disclaimer
Certain equipment, instruments, software, or materials are identified in this paper in order to specify the experimental procedure adequately. Such identification is not intended to imply recommendation or endorsement of any product or service by NIST, nor is it intended to imply that the materials or equipment identified are necessarily the best available for the purpose.
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Akbar, K.A., Rahman, F.I., Singhal, A., Khan, L., Thuraisingham, B. (2023). The Design and Application of a Unified Ontology for Cyber Security. In: Muthukkumarasamy, V., Sudarsan, S.D., Shyamasundar, R.K. (eds) Information Systems Security. ICISS 2023. Lecture Notes in Computer Science, vol 14424. Springer, Cham. https://doi.org/10.1007/978-3-031-49099-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-49099-6_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-49098-9
Online ISBN: 978-3-031-49099-6
eBook Packages: Computer ScienceComputer Science (R0)