skip to main content
10.1145/2642803.2642805acmotherconferencesArticle/Chapter ViewAbstractPublication PagesecsawConference Proceedingsconference-collections
research-article

Adaptive Risk Management with Ontology Linked Evidential Statistics and SDN

Published: 25 August 2014 Publication History

Abstract

New technologies have increased the dynamism of distributed systems; advances such as Software Defined Networking (SDN) and cloud computing enable unprecedented service flexibility and scalability. By their nature, they are in a constant state of flux, presenting tough challenges for system security. Here an adaptive -- in real time - risk management system capable of keeping abreast of these developments is considered. This paper presents an on-going work on combining a hierarchical threat ontology, real-time risk analysis, and SDN to an efficient whole. The main contribution of this paper is on finding the suitable architectures, components, necessary requirements, and favorable modifications on the systems and system modelling (including the models involving the security analysis) to reach this goal.

References

[1]
An Introduction to MCMC methods and Bayesian Statistics. 2012. Retrieved June 6, 2014, from Centre of Multilevel Modelling, University of Bristol: http://www.ccsr.ac.uk/esds/events/2012-07-11/mcmc.pdf
[2]
Dezert, J. and Smarandache, F. An introduction to DSmT. Retrieved June 6, 2014, from Smarandache Notions Journal: http://www.gallup.unm.edu/~smarandache/IntroductionToDSmT.pdf
[3]
Enns, R., Bjorklund, M., Schoenwaelder, J., and Bierman, A. 2011. Network Configuration Protocol (NETCONF). Internet Engineering Task Force, RFC 6241, June 2011.
[4]
Evesti, A., Savola, R., Ovaska, E., and Kuusijärvi, J. 2011. The Design, Instantiation, and Usage of Information Security Measuring Ontology. In The Second International Conference on Models and Ontology-based Design of Protocols, Architectures and Services (Budapest, Hungary, 17-22 April, 2011), MOPAS 2011, 1--9.
[5]
Evesti, A., Ovaska, E., and Savola, R. 2009. From Security Modelling to Run-time Security Monitoring. In the Proceedings of European Workshop on Security in Model-Driven Architecture (Enschede, the Netherlands, 24 June, 2009), SECMDA, 33--41.
[6]
Fenton, N. 2012. Probability Theory and Bayesian Belief Bayesian Networks. Retrieved June 6, 2014: http://www.eecs.qmul.ac.uk/~norman/BBNs/BBNs.htm
[7]
Fenton, N. and Neil, M. 2012. Risk Assessment and Decision Analysis with Bayesian Networks. CRC Press, October 2012. Retrieved June 30, 2014: http://www.eecs.qmul.ac.uk/~norman/BBNs/BBNs.htm
[8]
Fielding, R. T. 2000. Architectural Styles and the Design of Network-based Software Architectures. Chapter 5: Representational State Transfer (REST). University of California, Irvine.
[9]
Fonnesbeck, C., Patil, A., Huard, D. and Salvatier, J. 2013. PyMC Documentation. Retrieved June 6, 2014: http://pymc-devs.github.io/pymc/README
[10]
Glowacka, J. and Amanowicz, M. 2012. Application of Dezert-Smarandache theory for tactical MANET security enhancement. In Communications and Information Systems Conference (MCC), Military, 1--6.
[11]
Gruber, T.R. Towards principles for the design of ontologies used for knowledge sharing. International Journal Human-Computer Studies, 43 (5/6), 907--928.
[12]
ISO/IEC 27005:2008. Information technology - Security techniques - Information security risk management. ISO, Geneva.
[13]
Hu, W., Xie, D., Tan, T., and Maybank, S. 2004. Learning activity patterns using fuzzy self-organizing neural network. In IEEE Transactions Systems, Man, and Cybernetics, Part B: Cybernetics, 34 (3), 1618--1626.
[14]
Jürjens, J. 2005. Secure Systems Development with UML, Springer.
[15]
Kearney, P. and Brügger, L. 2007. A risk-driven security analysis method and modelling language. In Technology Journal, 25, (1), 141--153.
[16]
Kreutz, D., Ramos, F. M., and Verissimo, P. 2013. Towards Secure and Dependable Software-Defined Networks. In Proceedings of the second ACM SIGCOMM workshop on Hot Topics in Software Defined Networking, HotSDN'13, 55--60. DOI= http://doi.acm.org/10.1145/2491185.2491199
[17]
Martin, A. Matlab toolbox for a general belief functions framework. Retrieved June 10, 2014: http://martin.iutlan.univ-rennes1.fr/Doc/GeneralBeliefFunctionsFramework.tar
[18]
MikroTik Routerboard. Retrieved June 13, 2014: http://routerboard.com/RB2011UiAS-RM
[19]
MikroTik RouterOS. 2010. Retrieved June 27, 2014: http://www.mikrotik.com/pdf/what_is_routeros.pdf
[20]
Open Networking Foundation (ONF). 2009-2014. Open Flow Specifications. Retrieved June 6, 2014: https://www.opennetworking.org/sdn-resources/onf-specifications
[21]
Open Networking Foundation (ONF). 2014. OF-Config 1.2 OpenFlow Management and Configuration Protocol. Retrieved June 27, 2014: https://www.opennetworking.org/images/stories/downloads/sdn-resources/onf-specifications/openflow-config/of-config-1.2.pdf
[22]
Open Networking Foundation (ONF). 2012. Software-Defined Networking: The New Norm for Networks. ONF White paper. April 13, 2012. Retrieved June 27, 2014: https://www.opennetworking.org/images/stories/downloads/sdn-resources/white-papers/wp-sdn-newnorm.pdf
[23]
Reineking, T. A Python library for performing calculations in the Dempster-Shafer theory of evidence. Retrieved June 6, 2014 from pyds by Reineking: http://reineking.github.io/pyds/
[24]
Ruponen, S. 2013. On Software-defined Networking for Rural Areas: Controlling Wireless Networks with OpenFlow. In the Fifth International Conference on e-Infrastructure and e-Services for Developing Countries, (Blantyre, Malawi, 25--27 November, 2013), AFRICOMM 2013.
[25]
Ryu - Component-based software defined networking framework. 2014. Retrieved June 13, 2014 from Ryu SDN Framework Community: http://osrg.github.io/ryu/
[26]
SASER/SIEGFRIED Safe and Secure European Routing -- Security In EnerGy-efficient Flexible and ResilIEnt Data networks. Retrieved June 27, 2014: http://www.celticplus.eu/Projects/Celtic-Plus-Projects/2011/SASER/SASER-b-Siegfried/saser-b-default.asp
[27]
Sentz, K. and Ferson, S. 2002. Combination of Evidence in Dempster-Shafer Theory. Technical report, SAND2002-0835, Sandia National Laboratories. Retrieved June 5, 2014: http://www.sandia.gov/epistemic/Reports/SAND2002-0835.pdf
[28]
Shen, T., Gan, J. and Yao, L. 1992. Application Of Fuzzy Neural Computing For Partitioning Circuits. In Custom Integrated Circuits Conference, (Boston, MA, USA, 1992), IEEE, 5.3.1 - 5.3.4.
[29]
SIGMONA - SDN Concept in Generalized Mobile Network Architectures. 2014. Retrieved 30 June, 2014: http://www.sigmona.org/
[30]
Sindre, G. and Opdahl, A. 2005. Eliciting security requirements with misuse cases. Requirements Engineering, 10 (1), 34--44. DOI=http://dx.doi.org/10.1007/s00766-004-0194-4
[31]
Sun, L., Srivastava, R.P., and Mock, T.J. 2006. An Information Systems Security Risk Assessment Model Under the Dempster-Shafer Theory of Belief Functions. Management Information Systems, 22 (4), 109--142.
[32]
User guide: Naive Bayes, 2010--2013. Retrieved June 5, 2014, from scikit-learn developers: http://scikit-learn.org/stable/modules/naive_bayes.html
[33]
Vallivaara, V., Sailio, M., and Halunen, K. Detecting Man-in-the-Middle Attacks on Non-Mobile Systems, in Conference on Data and Application Security and Privacy, (San Antonio, Texas, USA, 2014), ACM, 131--133.
[34]
Zhou, J. Knowledge Dichotomy and Semantic Knowledge Management. 2005. In Proceedings of the 1st IFIP WG12.5 Working Conference on Industrial Applications of Semantic Web, (Jyväskylä, Finland, 25--27 August, 2005), Springer, 305--316.

Cited By

View all
  • (2018)Combining real-time risk visualization and anomaly detectionProceedings of the 12th European Conference on Software Architecture: Companion Proceedings10.1145/3241403.3241460(1-7)Online publication date: 24-Sep-2018
  • (2016)Empirical Evidences in Software-Defined Network Security: A Systematic Literature ReviewInformation Fusion for Cyber-Security Analytics10.1007/978-3-319-44257-0_11(253-295)Online publication date: 22-Oct-2016

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ECSAW '14: Proceedings of the 2014 European Conference on Software Architecture Workshops
August 2014
214 pages
ISBN:9781450327787
DOI:10.1145/2642803
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 August 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Adaptive security
  2. Dempster-Schafer
  3. Dezert-Smarandache
  4. Neural Network inspired Fuzzy C-means
  5. SDN
  6. Threat ontology

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ECSAW '14

Acceptance Rates

ECSAW '14 Paper Acceptance Rate 29 of 43 submissions, 67%;
Overall Acceptance Rate 80 of 120 submissions, 67%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Combining real-time risk visualization and anomaly detectionProceedings of the 12th European Conference on Software Architecture: Companion Proceedings10.1145/3241403.3241460(1-7)Online publication date: 24-Sep-2018
  • (2016)Empirical Evidences in Software-Defined Network Security: A Systematic Literature ReviewInformation Fusion for Cyber-Security Analytics10.1007/978-3-319-44257-0_11(253-295)Online publication date: 22-Oct-2016

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media