Abstract
In this paper, the functional-semantic model of cyber security is proposed as an initial step towards the development of a new unified methodological cyber security basis. This model makes it possible to formalize requirements for confidentiality, integrity, and availability, as well as to obtain ontological knowledge inferences about the system security state.
Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
Klir, Dzh., Sistemologiya. Avtomatizatsiya resheniya sistemnykh zadach (Systemology. Automation for Solving System Tasks), Moscow: Radio i Svyaz’, 1990.
Fonseca, F., Egenhofer, M., Davis, C., and Borges, K., Ontologies and knowledge sharing in Urban GIS, Comput. Environ. Urban. Syst., 2000, no. 24 (3), pp. 232–251.
Blake, B., A Method for Implementing Intention-Based Attack Ontologies with SIEM Software, FishNet, 2014.
Palo Alto Networks® and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats, 2013.
Jansse, T. and Grady, N., Big Data for Combating Cyber Attacks, Semantic Technology for Intelligence, Defense and Security (STID), 2013.
Marques, M., et al., An ontological approach to mitigate risk in web applications, Proceedings of SBSeg, 2014.
Liu, F.-H., et al., Constructing enterprise information network security risk management mechanism by ontology, Tamkang J. Sci. Eng., 2010, vol. 13–1, pp. 79–87.
Kamongi, P., et al., VULCAN: Vulnerability assessment framework for cloud computing, IEEE 7th International Conference, 2013, pp. 218–226.
Wang, J.A. and Minzhe, G.: OVM: An ontology for vulnerability management, CSIIRW, 2009, p. 34.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © P.D. Zegzhda, D.P. Zegzhda, T.V. Stepanova, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.
About this article
Cite this article
Zegzhda, P.D., Zegzhda, D.P. & Stepanova, T.V. Approach to the construction of the generalized functional-semantic cyber security model. Aut. Control Comp. Sci. 49, 627–633 (2015). https://doi.org/10.3103/S0146411615080192
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411615080192